Philip Stoner (Deloitte)
AI Adoption and Skill Development in Security Operations Centers
View More Papers
Eclipse Attacks on Monero's Peer-to-Peer Network
Ruisheng Shi (Beijing University of Posts and Telecommunications), Zhiyuan Peng (Beijing University of Posts and Telecommunications), Lina Lan (Beijing University of Posts and Telecommunications), Yulian Ge (Beijing University of Posts and Telecommunications), Peng Liu (Penn State University), Qin Wang (CSIRO Data61), Juan Wang (Wuhan University)
Read MoreRACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command...
Jiangyi Deng (Zhejiang University), Xinfeng Li (Zhejiang University), Yanjiao Chen (Zhejiang University), Yijie Bai (Zhejiang University), Haiqin Weng (Ant Group), Yan Liu (Ant Group), Tao Wei (Ant Group), Wenyuan Xu (Zhejiang University)
Read MoreProbe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing
Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University)
Read MoreSHAFT: Secure, Handy, Accurate and Fast Transformer Inference
Andes Y. L. Kei (Chinese University of Hong Kong), Sherman S. M. Chow (Chinese University of Hong Kong)
Read More