Ahmed Mostafa, Raisul Arefin Nahid, Samuel Mulder (Auburn University)
How Different Tokenization Algorithms Impact LLMs and Transformer Models for Binary Code Analysis
View More Papers
Eclipse Attacks on Monero's Peer-to-Peer Network
Ruisheng Shi (Beijing University of Posts and Telecommunications), Zhiyuan Peng (Beijing University of Posts and Telecommunications), Lina Lan (Beijing University of Posts and Telecommunications), Yulian Ge (Beijing University of Posts and Telecommunications), Peng Liu (Penn State University), Qin Wang (CSIRO Data61), Juan Wang (Wuhan University)
Read MoreUser Comprehension and Comfort with Eye-Tracking and Hand-Tracking Permissions...
Kaiming Cheng (University of Washington), Mattea Sim (Indiana University), Tadayoshi Kohno (University of Washington), Franziska Roesner (University of Washington)
Read MoreMismatched SOCs: A Case Study of Cybersecurity Goal Incongruency...
Andrew Morin (University of Tulsa)
Read More