Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation

Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12

MPCache: MPC-Friendly KV Cache Eviction for Efficient Private Large Language Model Inference

Authors: Wenxuan Zeng, Ye Dong, Jinjin Zhou, Junming Ma, Jin Tan, Runsheng Wang, Meng Li | Published: 2025-01-12

Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks

Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10

Unveiling Malware Patterns: A Self-analysis Perspective

Authors: Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Xiuzhen Cheng | Published: 2025-01-10

Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures

Authors: Sina Ahmadi | Published: 2025-01-10

IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks

Authors: Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole | Published: 2025-01-10

Learning-based Detection of GPS Spoofing Attack for Quadrotors

Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10

Infecting Generative AI With Viruses

Authors: David Noever, Forrest McKee | Published: 2025-01-09

Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues

Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09