Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
The “Beatrix” Resurrections: Robust Backdoor Detection via Gram Matrices
Wanlun Ma (Swinburne University of Technology), Derui Wang (CSIRO’s Data61), Ruoxi Sun (The University of Adelaide & CSIRO's Data61), Minhui Xue (CSIRO's Data61), Sheng Wen (Swinburne University of Technology), Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)
Read MoreWIP: Augmenting Vehicle Safety With Passive BLE
Noah T. Curran (University of Michigan), Kang G. Shin (University of Michigan), William Hass (Lear Corporation), Lars Wolleschensky (Lear Corporation), Rekha Singoria (Lear Corporation), Isaac Snellgrove (Lear Corporation), Ran Tao (Lear Corporation)
Read MoreA Robust Counting Sketch for Data Plane Intrusion Detection
Sian Kim (Ewha Womans University), Changhun Jung (Ewha Womans University), RhongHo Jang (Wayne State University), David Mohaisen (University of Central Florida), DaeHun Nyang (Ewha Womans University)
Read MoreMyTEE: Own the Trusted Execution Environment on Embedded Devices
Seungkyun Han (Chungnam National University), Jinsoo Jang (Chungnam National University)
Read More