LLM性能評価

Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets

Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04
LLM性能評価
データプライバシー管理
プロンプトリーキング

Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field

Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03
LLM性能評価
モデル抽出攻撃

ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense

Authors: Nancy Lau, Louis Sloot, Jyoutir Raj, Giuseppe Marco Boscardin, Evan Harris, Dylan Bowman, Mario Brajkovski, Jaideep Chawla, Dan Zhao | Published: 2026-03-02
LLM性能評価
インダイレクトプロンプトインジェクション
脆弱性評価手法

Real Money, Fake Models: Deceptive Model Claims in Shadow APIs

Authors: Yage Zhang, Yukun Jiang, Zeyuan Chen, Michael Backes, Xinyue Shen, Yang Zhang | Published: 2026-03-02
LLM性能評価
データプライバシー管理

DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern

Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02
LLM性能評価
インダイレクトプロンプトインジェクション
プロンプトインジェクション

Towards Privacy-Preserving LLM Inference via Collaborative Obfuscation (Technical Report)

Authors: Yu Lin, Qizhi Zhang, Wenqiang Ruan, Daode Zhang, Jue Hong, Ye Wu, Hanning Xia, Yunlong Mao, Sheng Zhong | Published: 2026-03-02
LLMの安全機構の解除
LLM性能評価
差分プライバシー

LLM Novice Uplift on Dual-Use, In Silico Biology Tasks

Authors: Chen Bo Calvin Zhang, Christina Q. Knight, Nicholas Kruus, Jason Hausenloy, Pedro Medeiros, Nathaniel Li, Aiden Kim, Yury Orlovskiy, Coleman Breen, Bryce Cai, Jasper Götting, Andrew Bo Liu, Samira Nedungadi, Paula Rodriguez, Yannis Yiming He, Mohamed Shaaban, Zifan Wang, Seth Donoughe, Julian Michael | Published: 2026-02-26
LLM性能評価
モデル評価手法
教育データマイニング

IMMACULATE: A Practical LLM Auditing Framework via Verifiable Computation

Authors: Yanpei Guo, Wenjie Qu, Linyu Wu, Shengfang Zhai, Lionel Z. Wang, Ming Xu, Yue Liu, Binhang Yuan, Dawn Song, Jiaheng Zhang | Published: 2026-02-26
LLM性能評価
モデル評価手法
監査手法

Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments

Authors: Kunal Mukherjee | Published: 2026-02-23
LLM性能評価
プロンプトリーキング
脆弱性分析

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification

Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18
LLM性能評価
インダイレクトプロンプトインジェクション
プロンプトインジェクション