Evaluation Method

CNT: Safety-oriented Function Reuse across LLMs via Cross-Model Neuron Transfer

Authors: Yue Zhao, Yujia Gong, Ruigang Liang, Shenchen Zhu, Kai Chen, Xuejing Yuan, Wangjun Zhang | Published: 2026-03-19
Alignment
Calculation of Output Harmfulness
Evaluation Method

Prompt Control-Flow Integrity: A Priority-Aware Runtime Defense Against Prompt Injection in LLM Systems

Authors: Md Takrim Ul Alam, Akif Islam, Mohd Ruhul Ameen, Abu Saleh Musa Miah, Jungpil Shin | Published: 2026-03-19
LLM Performance Evaluation
Indirect Prompt Injection
Evaluation Method

PlanTwin: Privacy-Preserving Planning Abstractions for Cloud-Assisted LLM Agents

Authors: Guangsheng Yu, Qin Wang, Rui Lang, Shuai Su, Xu Wang | Published: 2026-03-19
Indirect Prompt Injection
Privacy Leakage
Evaluation Method

Differential Privacy in Generative AI Agents: Analysis and Optimal Tradeoffs

Authors: Ya-Ting Yang, Quanyan Zhu | Published: 2026-03-18
Privacy Leakage
Differential Privacy
Evaluation Method

Machine Learning for Network Attacks Classification and Statistical Evaluation of Machine Learning for Network Attacks Classification and Adversarial Learning Methodologies for Synthetic Data Generation

Authors: Iakovos-Christos Zarkadis, Christos Douligeris | Published: 2026-03-18
Poisoning
Differential Privacy
Evaluation Method

rSDNet: Unified Robust Neural Learning against Label Noise and Adversarial Attacks

Authors: Suryasis Jana, Abhik Ghosh | Published: 2026-03-18
Poisoning
Robustness Evaluation
Evaluation Method

DDH-based schemes for multi-party Function Secret Sharing

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2026-03-18
DPPセット生成
Data Privacy Assessment
Evaluation Method

Federated Computing as Code (FCaC): Sovereignty-aware Systems by Design

Authors: Enzo Fenoglio, Philip Treleaven | Published: 2026-03-18
Data Integrity Constraints
Evaluation Method
Federated Learning

Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs

Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18
LLM Performance Evaluation
Poisoning attack on RAG
Evaluation Method

Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning

Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18
Privacy Leakage
Machine Learning Application
Evaluation Method