The Essentials of AI for Life and Society: An AI Literacy Course for the University Community Authors: Joydeep Biswas, Don Fussell, Peter Stone, Kristin Patterson, Kristen Procko, Lea Sabatini, Zifan Xu | Published: 2025-01-13 Privacy Design PrinciplesRole of Artificial IntelligenceEducation and Follow-up 2025.01.13 2025.05.27 Literature Database
Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13 LLM Performance EvaluationCybersecuritySmart Contract 2025.01.13 2025.05.27 Literature Database
Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12 Network Threat DetectionPhishing DetectionConvergence Analysis 2025.01.12 2025.05.27 Literature Database
MPCache: MPC-Friendly KV Cache Eviction for Efficient Private Large Language Model Inference Authors: Wenxuan Zeng, Ye Dong, Jinjin Zhou, Junming Ma, Jin Tan, Runsheng Wang, Meng Li | Published: 2025-01-12 LLM Performance EvaluationMPC AlgorithmToken Collection Method 2025.01.12 2025.05.27 Literature Database
Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10 CybersecurityCryptographyDurability Issue 2025.01.10 2025.05.27 Literature Database
Unveiling Malware Patterns: A Self-analysis Perspective Authors: Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Xiuzhen Cheng | Published: 2025-01-10 Malware ClassificationBasic Block AnalysisImage Feature Extraction 2025.01.10 2025.05.27 Literature Database
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures Authors: Sina Ahmadi | Published: 2025-01-10 Zero TrustUser Activity AnalysisDynamic Access Control 2025.01.10 2025.05.27 Literature Database
IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks Authors: Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole | Published: 2025-01-10 IoT Device IdentificationFirmware Version IdentificationTime Window Analysis 2025.01.10 2025.05.27 Literature Database
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 CybersecurityExperimental ValidationAttack Evaluation 2025.01.10 2025.05.27 Literature Database
Infecting Generative AI With Viruses Authors: David Noever, Forrest McKee | Published: 2025-01-09 CybersecurityData ObfuscationMalware Classification 2025.01.09 2025.05.27 Literature Database