Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Cyber Threat Intelligence for SOC Analysts
Nidhi Rastogi, Md Tanvirul Alam (Rochester Institute of Technology)
Read MoreVulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of Computer, National University of Defense Technology), Baosheng Wang (College of Computer, National University of Defense Technology), Yong Tang (College of Computer, National University of Defense Technology), Wei Xie (College of Computer, National University of Defense Technology), Xu Zhou (College of Computer,…
Read MoreOn the Anonymity of Peer-To-Peer Network Anonymity Schemes Used...
Piyush Kumar Sharma (imec-COSIC, KU Leuven), Devashish Gosain (Max Planck Institute for Informatics), Claudia Diaz (Nym Technologies, SA and imec-COSIC, KU Leuven)
Read More