Showing 1–20 of 34 results
/ Date/ Name
May 30, 2022HiViT: Hierarchical Vision Transformer Meets Masked Image ModelingFeb 12, 2019Adversarial Samples on Android Malware Detection Systems for IoT SystemsApr 11, 2019Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and DefensesFeb 6, 2024EVA-CLIP-18B: Scaling CLIP to 18 Billion ParametersJun 30, 2024UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS ChipsJun 15, 2024Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT ManipulationSep 27, 2024Emu3: Next-Token Prediction is All You NeedMay 31, 2025Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol (MCP) EcosystemJul 29, 2025X-Omni: Reinforcement Learning Makes Discrete Autoregressive Image Generative Models Great AgainJan 26, 2019A Black-box Attack on Neural Networks Based on Swarm Evolutionary AlgorithmMay 11, 2023SigRec: Automatic Recovery of Function Signatures in Smart ContractsOct 31, 2023CapsFusion: Rethinking Image-Text Data at ScaleAug 16, 2024Correspondence-Guided SfM-Free 3D Gaussian Splatting for NVSMar 21, 2024Large Language Models for Blockchain Security: A Systematic Literature ReviewMar 11, 2017Under-Optimized Smart Contracts Devour Your MoneyMay 26, 2025ReDDiT: Rehashing Noise for Discrete Visual GenerationSep 5, 2019FreeAnchor: Learning to Match Anchors for Visual Object DetectionJun 24, 2024Do As I Do: Pose Guided Human Motion CopyApr 6, 2023SegGPT: Segmenting Everything In ContextAug 31, 2025X-PRINT:Platform-Agnostic and Scalable Fine-Grained Encrypted Traffic Fingerprinting