You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22 2022.09.22 2025.05.28 Literature Database
Talking Trojan: Analyzing an Industry-Wide Disclosure Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22 2022.09.22 2025.05.28 Literature Database
Android Private Compute Core Architecture Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22 2022.09.21 2025.05.28 Literature Database
Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study Authors: Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud | Published: 2022-09-21 2022.09.21 2025.05.28 Literature Database
Federated Learning from Pre-Trained Models: A Contrastive Learning Approach Authors: Yue Tan, Guodong Long, Jie Ma, Lu Liu, Tianyi Zhou, Jing Jiang | Published: 2022-09-21 2022.09.21 2025.05.28 Literature Database
Generate rather than Retrieve: Large Language Models are Strong Context Generators Authors: Wenhao Yu, Dan Iter, Shuohang Wang, Yichong Xu, Mingxuan Ju, Soumya Sanyal, Chenguang Zhu, Michael Zeng, Meng Jiang | Published: 2022-09-21 | Updated: 2023-01-25 2022.09.21 2025.05.28 Literature Database
Audit and Improve Robustness of Private Neural Networks on Encrypted Data Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20 2022.09.20 2025.05.28 Literature Database
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung | Published: 2022-09-20 | Updated: 2024-06-12 2022.09.20 2025.05.28 Literature Database
Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19 2022.09.19 2025.05.28 Literature Database
Distribution inference risks: Identifying and mitigating sources of leakage Authors: Valentin Hartmann, Léo Meynent, Maxime Peyrard, Dimitrios Dimitriadis, Shruti Tople, Robert West | Published: 2022-09-18 2022.09.18 2025.05.28 Literature Database