Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach

Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13

Multimodal Attack Detection for Action Recognition Models

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13

Empowering Malware Detection Efficiency within Processing-in-Memory Architecture

Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12

JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models

Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12

Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward

Authors: Xuan Xie, Jiayang Song, Zhehua Zhou, Yuheng Huang, Da Song, Lei Ma | Published: 2024-04-12

Subtoxic Questions: Dive Into Attitude Change of LLM’s Response in Jailbreak Attempts

Authors: Tianyu Zhang, Zixuan Zhao, Jiaqi Huang, Jingyu Hua, Sheng Zhong | Published: 2024-04-12

A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions

Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11

Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers

Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11

Privacy preserving layer partitioning for Deep Neural Network models

Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11