evaluation metrics

A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality

Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04
LLM Performance Evaluation
Alignment
evaluation metrics

LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection

Authors: Naveen Gill, Ajvad Haneef K, Madhu Kumar S D | Published: 2026-02-10
Prompt Injection
Model Selection Method
evaluation metrics

ReSIM: Re-ranking Binary Similarity Embeddings to Improve Function Search Performance

Authors: Gianluca Capozzi, Anna Paola Giancaspro, Fabio Petroni, Leonardo Querzoni, Giuseppe Antonio Di Luna | Published: 2026-02-10
Model Design
Computational Efficiency
evaluation metrics

A Behavioral Fingerprint for Large Language Models: Provenance Tracking via Refusal Vectors

Authors: Zhenyu Xu, Victor S. Sheng | Published: 2026-02-10
Disabling Safety Mechanisms of LLM
LLM Performance Evaluation
evaluation metrics

FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning

Authors: Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu | Published: 2026-01-29
Robustness
Machine Unlearning
evaluation metrics

Defining Cost Function of Steganography with Large Language Models

Authors: Hanzhou Wu, Yige Wang | Published: 2025-12-10
画像処理手法
evaluation metrics
Evolutionary Score Calculation

PromptLocate: Localizing Prompt Injection Attacks

Authors: Yuqi Jia, Yupei Liu, Zedian Shao, Jinyuan Jia, Neil Gong | Published: 2025-10-14
Prompt validation
Large Language Model
evaluation metrics

Sy-FAR: Symmetry-based Fair Adversarial Robustness

Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16
Ensuring Fairness
Adversarial Learning
evaluation metrics

Jailbreaking Large Language Models Through Content Concretization

Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16
Prompt Injection
Model Evaluation
evaluation metrics

Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset

Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16
Cybersecurity
Performance Evaluation
evaluation metrics