Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
The “Beatrix” Resurrections: Robust Backdoor Detection via Gram Matrices
Wanlun Ma (Swinburne University of Technology), Derui Wang (CSIRO’s Data61), Ruoxi Sun (The University of Adelaide & CSIRO's Data61), Minhui Xue (CSIRO's Data61), Sheng Wen (Swinburne University of Technology), Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)
Read MoreVASP: V2X Application Spoofing Platform
Mohammad Raashid Ansari, Jonathan Petit, Jean-Philippe Monteuuis, Cong Chen (Qualcomm Technologies, Inc.)
Read MoreAssessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Hugo Lefeuvre (The University of Manchester), Vlad-Andrei Bădoiu (University Politehnica of Bucharest), Yi Chen (Rice University), Felipe Huici (Unikraft.io), Nathan Dautenhahn (Rice University), Pierre Olivier (The University of Manchester)
Read More