Evaluation Method

Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks

Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17
Algorithm
Privacy Analysis
Evaluation Method

Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection

Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20
Certified Robustness
Robustness Improvement Method
Evaluation Method

DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning

Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18
Model Design
Machine Learning Framework
Evaluation Method

Cascading and Proxy Membership Inference Attacks

Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29
Poisoning
メンバーシップ推定
Evaluation Method

Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU

Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25
Prompt Injection
Memory Management Method
Evaluation Method

JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation

Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25
Indirect Prompt Injection
コード脆弱性修復
Evaluation Method

Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test

Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11
API Security
Evaluation Method
Selection Method

DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response

Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26
Hallucination
Model Performance Evaluation
Evaluation Method

Cape: Context-Aware Prompt Perturbation Mechanism with Differential Privacy

Authors: Haoqi Wu, Wei Dai, Li Wang, Qiang Yan | Published: 2025-05-09 | Updated: 2025-05-15
Token Identification Method
Privacy Design Principles
Evaluation Method

Defending against Indirect Prompt Injection by Instruction Detection

Authors: Tongyu Wen, Chenglong Wang, Xiyuan Yang, Haoyu Tang, Yueqi Xie, Lingjuan Lyu, Zhicheng Dou, Fangzhao Wu | Published: 2025-05-08 | Updated: 2025-09-17
Prompt validation
Evaluation Method
Watermarking Technology