Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
How Different Tokenization Algorithms Impact LLMs and Transformer Models for Binary Code Analysis
View More Papers
On the Realism of LiDAR Spoofing Attacks against Autonomous...
Takami Sato (University of California, Irvine), Ryo Suzuki (Keio University), Yuki Hayakawa (Keio University), Kazuma Ikeda (Keio University), Ozora Sako (Keio University), Rokuto Nagata (Keio University), Ryo Yoshida (Keio University), Qi Alfred Chen (University of California, Irvine), Kentaro Yoshioka (Keio University)
Read MoreLLMPirate: LLMs for Black-box Hardware IP Piracy
Vasudev Gohil (Texas A&M University), Matthew DeLorenzo (Texas A&M University), Veera Vishwa Achuta Sai Venkat Nallam (Texas A&M University), Joey See (Texas A&M University), Jeyavijayan Rajendran (Texas A&M University)
Read MoreRAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with Adversarial...
Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr (University of Massachusetts Amherst)
Read MoreCascading Spy Sheets: Exploiting the Complexity of Modern CSS...
Leon Trampert (CISPA Helmholtz Center for Information Security), Daniel Weber (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for Information Security), Michael Schwarz (CISPA Helmholtz Center for Information Security)
Read More