BEACON: Behavioral Malware Classification with Large Language Model Embeddings and Deep Learning Authors: Wadduwage Shanika Perera, Haodi Jiang | Published: 2025-09-18 Malware Detection ScenarioBehavior Analysis MethodEvaluation Method 2025.09.18 2025.09.20 Literature Database
Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17 Poisoning attack on RAGEvaluation Method責任帰属システム設計 2025.09.17 2025.09.19 Literature Database
Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17 AlgorithmPrivacy AnalysisEvaluation Method 2025.08.22 2025.09.19 Literature Database
Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20 Certified RobustnessRobustness Improvement MethodEvaluation Method 2025.08.20 2025.08.22 Literature Database
DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18 Model DesignMachine Learning FrameworkEvaluation Method 2025.08.09 2025.09.20 Literature Database
Cascading and Proxy Membership Inference Attacks Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29 Poisoningメンバーシップ推定Evaluation Method 2025.07.29 2025.07.31 Literature Database
Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25 Prompt InjectionMemory Management MethodEvaluation Method 2025.06.25 2025.06.27 Literature Database
JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25 Indirect Prompt Injectionコード脆弱性修復Evaluation Method 2025.06.25 2025.06.27 Literature Database
Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11 API SecurityEvaluation MethodSelection Method 2025.06.08 2025.06.13 Literature Database
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26 HallucinationModel Performance EvaluationEvaluation Method 2025.05.26 2025.05.28 Literature Database