Evaluation Method

BEACON: Behavioral Malware Classification with Large Language Model Embeddings and Deep Learning

Authors: Wadduwage Shanika Perera, Haodi Jiang | Published: 2025-09-18
Malware Detection Scenario
Behavior Analysis Method
Evaluation Method

Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17
Poisoning attack on RAG
Evaluation Method
責任帰属システム設計

Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks

Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17
Algorithm
Privacy Analysis
Evaluation Method

Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection

Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20
Certified Robustness
Robustness Improvement Method
Evaluation Method

DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning

Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18
Model Design
Machine Learning Framework
Evaluation Method

Cascading and Proxy Membership Inference Attacks

Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29
Poisoning
メンバーシップ推定
Evaluation Method

Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU

Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25
Prompt Injection
Memory Management Method
Evaluation Method

JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation

Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25
Indirect Prompt Injection
コード脆弱性修復
Evaluation Method

Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test

Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11
API Security
Evaluation Method
Selection Method

DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response

Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26
Hallucination
Model Performance Evaluation
Evaluation Method