LLM Performance Evaluation

Generalizable and Interpretable RF Fingerprinting with Shapelet-Enhanced Large Language Models

Authors: Tianya Zhao, Junqing Zhang, Haowen Xu, Xiaoyan Sun, Jun Dai, Xuyu Wang | Published: 2026-02-03
LLM Performance Evaluation
Fingerprinting Method
Prompt validation

WorldCup Sampling for Multi-bit LLM Watermarking

Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02
LLM Performance Evaluation
Algorithm Design
Watermarking

User-Centric Phishing Detection: A RAG and LLM-Based Approach

Authors: Abrar Hamed Al Barwani, Abdelaziz Amara Korba, Raja Waseem Anwar | Published: 2026-01-29
LLM Performance Evaluation
Poisoning attack on RAG
ユーザー中心のフィッシング検出

Eliciting Least-to-Most Reasoning for Phishing URL Detection

Authors: Holly Trikilis, Pasindu Marasinghe, Fariza Rashid, Suranga Seneviratne | Published: 2026-01-28
LLM Performance Evaluation
Prompt Injection
Prompt leaking

GAVEL: Towards rule-based safety through activation monitoring

Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27
LLM Performance Evaluation
Indirect Prompt Injection
Data Generation Method

Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis

Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06
LLM Performance Evaluation
Large Language Model
Evaluation Method

LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems

Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13
Bias Detection in AI Output
LLM Performance Evaluation
Prompt Injection

Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs

Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30
LLM Performance Evaluation
Poisoning attack on RAG
Attack Type

Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code

Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23
LLM Performance Evaluation
Training Method
Prompt leaking

aiXamine: Simplified LLM Safety and Security

Authors: Fatih Deniz, Dorde Popovic, Yazan Boshmaf, Euisuh Jeong, Minhaj Ahmad, Sanjay Chawla, Issa Khalil | Published: 2025-04-21 | Updated: 2025-04-23
LLM Performance Evaluation
Alignment
Performance Evaluation