Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03

FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning

Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02

Malicious code detection in android: the role of sequence characteristics and disassembling methods

Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02

Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis

Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01

Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting

Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05

TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features

Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21

MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files

Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08

The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11

Exploring the Robustness of Decentralized Training for Large Language Models

Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01

Mark My Words: Analyzing and Evaluating Language Model Watermarks

Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner | Published: 2023-12-01 | Updated: 2024-10-11