IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks

Authors: Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole | Published: 2025-01-10

Learning-based Detection of GPS Spoofing Attack for Quadrotors

Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10

Infecting Generative AI With Viruses

Authors: David Noever, Forrest McKee | Published: 2025-01-09

Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues

Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09

EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database

Authors: Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu | Published: 2025-01-09 | Updated: 2025-01-13

Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

Authors: Matteo Esposito | Published: 2025-01-09

TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning

Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li | Published: 2025-01-09

SpaLLM-Guard: Pairing SMS Spam Detection Using Open-source and Commercial LLMs

Authors: Muhammad Salman, Muhammad Ikram, Nardine Basta, Mohamed Ali Kaafar | Published: 2025-01-09

Jailbreaking Multimodal Large Language Models via Shuffle Inconsistency

Authors: Shiji Zhao, Ranjie Duan, Fengxiang Wang, Chi Chen, Caixin Kang, Jialing Tao, YueFeng Chen, Hui Xue, Xingxing Wei | Published: 2025-01-09