Cherlynn Cha (ExpressVPN)
Detection-as-Code: Build threat detections the way you build software
View More Papers
Understanding Miniapp Malware: Identification, Dissection, and Characterization
Yuqing Yang (The Ohio State University), Yue Zhang (Drexel University), Zhiqiang Lin (The Ohio State University)
Read MorePQConnect: Automated Post-Quantum End-to-End Tunnels
Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica), Tanja Lange (Eindhoven University of Technology amd Academia Sinica), Jonathan Levin (Academia Sinica and Eindhoven University of Technology), Bo-Yin Yang (Academia Sinica)
Read MoreHow Different Tokenization Algorithms Impact LLMs and Transformer Models...
Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
Read MoreDShield: Defending against Backdoor Attacks on Graph Neural Networks...
Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of Technology, Beijing, China), Xinwang Liu (National University of Defense Technology)
Read More