Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models
Rui Zeng (Zhejiang University), Xi Chen (Zhejiang University), Yuwen Pu (Zhejiang University), Xuhong Zhang (Zhejiang University), Tianyu Du (Zhejiang University), Shouling Ji (Zhejiang University)
Read MoremmProcess: Phase-Based Speech Reconstruction from mmWave Radar
Hyeongjun Choi, Young Eun Kwon, Ji Won Yoon (Korea University)
Read MoreJBomAudit: Assessing the Landscape, Compliance, and Security Implications of...
Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong Jang (IBM Research), Luyi Xing (Indiana University Bloomington), Xiaojing Liao (Indiana University)
Read MoreDRAGON: Predicting Decompiled Variable Data Types with Learned Confidence...
Caleb Stewart, Rhonda Gaede, Jeffrey Kulick (University of Alabama in Huntsville)
Read More