Fatemeh Mireshghallah
How Much Can We Trust Large Language Models?
View More Papers
Automatic Retrieval of Privacy Factors from IoMT Policies: ML...
Nyteisha Bookert, Mohd Anwar (North Carolina Agricultural and Technical State University)
Read MoreA Systematic Study of the Consistency of Two-Factor Authentication...
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for Information Security)
Read MoreGhost Domain Reloaded: Vulnerable Links in Domain Name Delegation...
Xiang Li (Tsinghua University), Baojun Liu (Tsinghua University), Xuesong Bai (University of California, Irvine), Mingming Zhang (Tsinghua University), Qifan Zhang (University of California, Irvine), Zhou Li (University of California, Irvine), Haixin Duan (Tsinghua University; QI-ANXIN Technology Research Institute; Zhongguancun Laboratory), Qi Li (Tsinghua University; Zhongguancun Laboratory)
Read MoreBridging the Privacy Gap: Enhanced User Consent Mechanisms on...
Carl Magnus Bruhner (Linkoping University), David Hasselquist (Linkoping University, Sectra Communications), Niklas Carlsson (Linkoping University)
Read More