Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
How Different Tokenization Algorithms Impact LLMs and Transformer Models for Binary Code Analysis
View More Papers
Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication...
Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego), Nasimeh Heydaribeni (University of California, San Diego), Seira Hidano (KDDI Research, Inc.), Xinyu Zhang (University of California, San Diego), Farinaz Koushanfar (University of California, San Diego)
Read MoreQSynth – A Program Synthesis based approach for Binary...
Robin David (Quarkslab), Luigi Coniglio (University of Trento), Mariano Ceccato (University of Verona)
Read MoreIncorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion...
Lingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI (Zhejiang University), R. Sekar (Stony Brook University), Han Liu (Northwestern University), Yan Chen (Northwestern University)
Read MoreTowards Establishing a Systematic Security Framework for Next Generation...
Tolga O. Atalay (A2 Labs LLC), Tianyuan Yu (UCLA), Lixia Zhang (UCLA), Angelos Stavrou (A2 Labs LLC)
Read More