Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain...
Xiao Yi (The Chinese University of Hong Kong), Yuzhou Fang (The Chinese University of Hong Kong), Daoyuan Wu (The Chinese University of Hong Kong), Lingxiao Jiang (Singapore Management University)
Read MoreDetection and Resolution of Control Decision Anomalies
Prof. Kang Shin (Kevin and Nancy O'Connor Professor of Computer Science, and the Founding Director of the Real-Time Computing Laboratory (RTCL) in the Electrical Engineering and Computer Science Department at the University of Michigan)
Read MoreBackdoor Attacks Against Dataset Distillation
Yugeng Liu (CISPA Helmholtz Center for Information Security), Zheng Li (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yun Shen (Netapp), Yang Zhang (CISPA Helmholtz Center for Information Security)
Read More