Lingzhi Wang (Northwestern University)
Tutorial: Using Aurora, an automated attack emulation system, to create benchmark datasets for intrusion detection
View More Papers
Beyond Jailbreak: Unveiling Risks in LLM Applications Arising from...
Yunyi Zhang (Tsinghua University), Shibo Cui (Tsinghua University), Baojun Liu (Tsinghua University), Jingkai Yu (Tsinghua University), Min Zhang (National University of Defense Technology), Fan Shi (National University of Defense Technology), Han Zheng (TrustAl Pte. Ltd.)
Read MoreCRISP: An Efficient Cryptographic Framework for ML Inference Against...
Xiaoyu Fang (Beijing University of Posts and Telecommunications), Shihui Zheng (Beijing University of Posts and Telecommunications), Lize Gu (Beijing University of Posts and Telecommunications)
Read More“These cameras are just like the Eye of Sauron”:...
Shijing He (King’s College London), Yaxiong Lei (University of St Andrews), Xiao Zhan (Universitat Politecnica de Valencia), Ruba Abu-Salma (King’s College London), Jose Such (INGENIO (CSIC-UPV))
Read More