評価手法

Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks

Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17
アルゴリズム
プライバシー分析
評価手法

Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection

Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20
モデルの頑健性保証
ロバスト性向上手法
評価手法

DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning

Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18
モデル設計
機械学習フレームワーク
評価手法

Cascading and Proxy Membership Inference Attacks

Authors: Yuntao Du, Jiacheng Li, Yuetian Chen, Kaiyuan Zhang, Zhizhen Yuan, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-07-29
ポイズニング
メンバーシップ推定
評価手法

Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU

Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25
プロンプトインジェクション
メモリ管理手法
評価手法

JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation

Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25
インダイレクトプロンプトインジェクション
コード脆弱性修復
評価手法

Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test

Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11
APIセキュリティ
評価手法
選択手法

DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response

Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26
ハルシネーション
モデル性能評価
評価手法

Cape: Context-Aware Prompt Perturbation Mechanism with Differential Privacy

Authors: Haoqi Wu, Wei Dai, Li Wang, Qiang Yan | Published: 2025-05-09 | Updated: 2025-05-15
トークン識別手法
プライバシー設計原則
評価手法

Defending against Indirect Prompt Injection by Instruction Detection

Authors: Tongyu Wen, Chenglong Wang, Xiyuan Yang, Haoyu Tang, Yueqi Xie, Lingjuan Lyu, Zhicheng Dou, Fangzhao Wu | Published: 2025-05-08 | Updated: 2025-09-17
プロンプトの検証
評価手法
透かし技術