Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Harjasleen Malvai (UIUC/IC3), Lefteris Kokoris-Kogias (IST Austria), Alberto Sonnino (Mysten Labs), Esha Ghosh (Microsoft Research), Ercan Oztürk (Meta), Kevin Lewi (Meta), Sean Lawlor (Meta)
Read MoreEvaluating Wireless Attacks Against CCS Electric Vehicle Charging
Sebastian Köhler (University of Oxford)
Read MoreGPS Spoofing Attack Detection on Intersection Movement Assist using...
Jun Ying (Purdue University), Yiheng Feng (Purdue University), Qi Alfred Chen (University of California, Irvine), Z. Morley Mao (University of Michigan)
Read MoreRoVISQ: Reduction of Video Service Quality via Adversarial Attacks...
Jung-Woo Chang (University of California San Diego), Mojan Javaheripi (University of California San Diego), Seira Hidano (KDDI Research, Inc.), Farinaz Koushanfar (University of California San Diego)
Read More