Showing 1–20 of 20 results
/ Date/ Name
Jan 24, 2018CommanderSong: A Systematic Approach for Practical Adversarial Voice RecognitionFeb 10, 2025LLMs in Software Security: A Survey of Vulnerability Detection Techniques and InsightsMar 16, 2026vCause: Efficient and Verifiable Causality Analysis for Cloud-based Endpoint AuditingOct 17, 2025SoK: Taxonomy and Evaluation of Prompt Security in Large Language ModelsMay 4, 2021Combining Supervised and Un-supervised Learning for Automatic Citrus SegmentationJul 3, 2018Confidential Inference via Ternary Model PartitioningJul 18, 2022Leaky-wave metasurfaces for integrated photonicsAug 7, 2024Periodically poled thin-film lithium niobate ring Mach Zehnder coupling interferometer as an efficient quantum source of lightMay 30, 2012Modelling Chinese Smart Grid: A Stochastic Model Checking Case StudySep 8, 2016From Physical to Cyber: Escalating Protection for Personalized Auto InsuranceAug 1, 2025Latent Knowledge Scalpel: Precise and Massive Knowledge Editing for Large Language ModelsMay 1, 2025The Illusion of Role Separation: Hidden Shortcuts in LLM Role Learning (and How to Fix Them)Sep 8, 2025All You Need Is A Fuzzing Brain: An LLM-Powered System for Automated Vulnerability Detection and PatchingDec 11, 2017IDIoT: Securing the Internet of Things like it's 1994Sep 6, 2025A tunable FP Perot coupling interferometer on thin-film lithium niobateMar 8, 2026From Thinker to Society: Security in Hierarchical Autonomy Evolution of AI AgentsDec 7, 2018Reaching Data Confidentiality and Model Accountability on the CalTrainJan 14, 2025How Far are App Secrets from Being Stolen? A Case Study on AndroidFeb 26, 2024SAND: Decoupling Sanitization from Fuzzing for Low OverheadAug 11, 2024ICSFuzz: Collision Detector Bug Discovery in Autonomous Driving Simulators