LLM Performance Evaluation

Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets

Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04
LLM Performance Evaluation
Data Privacy Management
Prompt leaking

Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field

Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03
LLM Performance Evaluation
Model Extraction Attack

ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense

Authors: Nancy Lau, Louis Sloot, Jyoutir Raj, Giuseppe Marco Boscardin, Evan Harris, Dylan Bowman, Mario Brajkovski, Jaideep Chawla, Dan Zhao | Published: 2026-03-02
LLM Performance Evaluation
Indirect Prompt Injection
Vulnerability Assessment Method

Real Money, Fake Models: Deceptive Model Claims in Shadow APIs

Authors: Yage Zhang, Yukun Jiang, Zeyuan Chen, Michael Backes, Xinyue Shen, Yang Zhang | Published: 2026-03-02
LLM Performance Evaluation
Data Privacy Management

DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern

Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02
LLM Performance Evaluation
Indirect Prompt Injection
Prompt Injection

Towards Privacy-Preserving LLM Inference via Collaborative Obfuscation (Technical Report)

Authors: Yu Lin, Qizhi Zhang, Wenqiang Ruan, Daode Zhang, Jue Hong, Ye Wu, Hanning Xia, Yunlong Mao, Sheng Zhong | Published: 2026-03-02
Disabling Safety Mechanisms of LLM
LLM Performance Evaluation
Differential Privacy

LLM Novice Uplift on Dual-Use, In Silico Biology Tasks

Authors: Chen Bo Calvin Zhang, Christina Q. Knight, Nicholas Kruus, Jason Hausenloy, Pedro Medeiros, Nathaniel Li, Aiden Kim, Yury Orlovskiy, Coleman Breen, Bryce Cai, Jasper Götting, Andrew Bo Liu, Samira Nedungadi, Paula Rodriguez, Yannis Yiming He, Mohamed Shaaban, Zifan Wang, Seth Donoughe, Julian Michael | Published: 2026-02-26
LLM Performance Evaluation
Model evaluation methods
Educational Data Mining

IMMACULATE: A Practical LLM Auditing Framework via Verifiable Computation

Authors: Yanpei Guo, Wenjie Qu, Linyu Wu, Shengfang Zhai, Lionel Z. Wang, Ming Xu, Yue Liu, Binhang Yuan, Dawn Song, Jiaheng Zhang | Published: 2026-02-26
LLM Performance Evaluation
Model evaluation methods
監査手法

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23
LLM Performance Evaluation
Prompt leaking
Vulnerability Analysis

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18
LLM Performance Evaluation
Indirect Prompt Injection
Prompt Injection