LLM Performance Evaluation

Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning

Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou | Published: 2024-06-06
LLM Performance Evaluation
Privacy Protection
Blockchain Technology

AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens

Authors: Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou | Published: 2024-06-06
LLM Performance Evaluation
Prompt Injection
Defense Method

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06
CVE Information Extraction
LLM Performance Evaluation
Vulnerability Management

Decoupled Alignment for Robust Plug-and-Play Adaptation

Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06
LLM Performance Evaluation
Prompt Injection
Model Performance Evaluation

BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models

Authors: Jiaqi Xue, Mengxin Zheng, Yebowen Hu, Fei Liu, Xun Chen, Qian Lou | Published: 2024-06-03 | Updated: 2024-06-06
LLM Performance Evaluation
Query Diversity
Query Generation Method

$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels

Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07
LLM Performance Evaluation
Watermarking
Secure Communication Channel

Harnessing Large Language Models for Software Vulnerability Detection: A Comprehensive Benchmarking Study

Authors: Karl Tamberg, Hayretdin Bahsi | Published: 2024-05-24
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

Evaluation of the Programming Skills of Large Language Models

Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23
LLM Performance Evaluation
Code Generation
Data Collection

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Information Leakage from Embedding in Large Language Models

Authors: Zhipeng Wan, Anda Cheng, Yinggui Wang, Lei Wang | Published: 2024-05-20 | Updated: 2024-05-22
LLM Performance Evaluation
Membership Inference
Model Performance Evaluation