Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Repurposing Neural Networks for Efficient Cryptographic Computation
Xin Jin (The Ohio State University), Shiqing Ma (University of Massachusetts Amherst), Zhiqiang Lin (The Ohio State University)
Read MoreBeyond the Breach: Unleashing the Power of Post Access...
James Fitts, Chris Fennel (Walmart)
Read MoreAlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight
Qi Xia (University of Texas at San Antonio), Qian Chen (University of Texas at San Antonio)
Read MoreRACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command...
Jiangyi Deng (Zhejiang University), Xinfeng Li (Zhejiang University), Yanjiao Chen (Zhejiang University), Yijie Bai (Zhejiang University), Haiqin Weng (Ant Group), Yan Liu (Ant Group), Tao Wei (Ant Group), Wenyuan Xu (Zhejiang University)
Read More