evaluation metrics

Sy-FAR: Symmetry-based Fair Adversarial Robustness

Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16
Ensuring Fairness
Adversarial Learning
evaluation metrics

Jailbreaking Large Language Models Through Content Concretization

Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16
Prompt Injection
Model Evaluation
evaluation metrics

Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset

Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16
Cybersecurity
Performance Evaluation
evaluation metrics

Deceptive Fairness Attacks on Graphs via Meta Learning

Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24
Graph Neural Network
Attack Method
evaluation metrics

Revisiting Transferable Adversarial Images: Systemization, Evaluation, and New Insights

Authors: Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes, Qi Li, Qian Wang, Chao Shen | Published: 2023-10-18 | Updated: 2025-09-16
Model Inversion
Adversarial Learning
evaluation metrics

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15
Data Generation
Privacy Protection Method
evaluation metrics

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04
Data Generation
Threat modeling
evaluation metrics

Jailbreaker in Jail: Moving Target Defense for Large Language Models

Authors: Bocheng Chen, Advait Paliwal, Qiben Yan | Published: 2023-10-03
LLM Performance Evaluation
Prompt Injection
evaluation metrics

Beyond Labeling Oracles: What does it mean to steal ML models?

Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13
Data Collection
Knowledge Extraction Method
evaluation metrics

Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement

Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23
Data Generation
Privacy Technique
evaluation metrics