Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
On the Feasibility of Profiling Electric Vehicles through Charging...
Ankit Gangwal (IIIT Hyderabad), Aakash Jain (IIIT Hyderabad) and Mauro Conti (University of Padua)
Read MoreUnderstanding the Ethical Frameworks of Internet Measurement Studies
Eric Pauley and Patrick McDaniel (University of Wisconsin–Madison)
Read MoreGPS Spoofing Attack Detection on Intersection Movement Assist using...
Jun Ying (Purdue University), Yiheng Feng (Purdue University), Qi Alfred Chen (University of California, Irvine), Z. Morley Mao (University of Michigan)
Read MoreVulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read More