Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations
Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)
Read MoreInfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise
Peng Huang (Zhejiang University), Yao Wei (Zhejiang University), Peng Cheng (Zhejiang University), Zhongjie Ba (Zhejiang University), Li Lu (Zhejiang University), Feng Lin (Zhejiang University), Fan Zhang (Zhejiang University), Kui Ren (Zhejiang University)
Read MoreWhy do Internet Devices Remain Vulnerable? A Survey with...
Tamara Bondar, Hala Assal, AbdelRahman Abdou (Carleton University)
Read MoreAutomata-Based Automated Detection of State Machine Bugs in Protocol...
Paul Fiterau-Brostean (Uppsala University, Sweden), Bengt Jonsson (Uppsala University, Sweden), Konstantinos Sagonas (Uppsala University, Sweden and National Technical University of Athens, Greece), Fredrik Tåquist (Uppsala University, Sweden)
Read More