
Sign up to save your podcasts
Or


Invisible Prompts, Visible Threats: Malicious Font Injection in External
Backdoor Cleaning without External Guidance in MLLM Fine-tuning
CAIN: Hijacking LLM-Humans Conversations via a Two-Stage Malicious
Unlearning Isn't Deletion: Investigating Reversibility of Machine
CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of
When Safety Detectors Aren't Enough: A Stealthy and Effective Jailbreak
Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing
Robust LLM Fingerprinting via Domain-Specific Watermarks
BitHydra: Towards Bit-flip Inference Cost Attack against Large Language
Unsupervised Network Anomaly Detection with Autoencoders and Traffic
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation
Finetuning-Activated Backdoors in LLMs
CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from
DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection
Language-based Security and Time-inserting Supervisor
Password Strength Detection via Machine Learning: Analysis, Modeling,
Consistent and Compatible Modelling of Cyber Intrusions and Incident
Privacy-Aware Cyberterrorism Network Analysis using Graph Neural
ReCopilot: Reverse Engineering Copilot in Binary Analysis
SuperPure: Efficient Purification of Localized and Distributed
Poster: Towards an Automated Security Testing Framework for Industrial
All You Need is "Leet": Evading Hate-speech Detection AI
Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with
Verifying Differentially Private Median Estimation
A Scalable Hierarchical Intrusion Detection System for Internet of
VIVID: A Novel Approach to Remediation Prioritization in Static
SafeKey: Amplifying Aha-Moment Insights for Safety Reasoning
Outsourcing SAT-based Verification Computations in Network Security
Exte
By KazuInvisible Prompts, Visible Threats: Malicious Font Injection in External
Backdoor Cleaning without External Guidance in MLLM Fine-tuning
CAIN: Hijacking LLM-Humans Conversations via a Two-Stage Malicious
Unlearning Isn't Deletion: Investigating Reversibility of Machine
CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of
When Safety Detectors Aren't Enough: A Stealthy and Effective Jailbreak
Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing
Robust LLM Fingerprinting via Domain-Specific Watermarks
BitHydra: Towards Bit-flip Inference Cost Attack against Large Language
Unsupervised Network Anomaly Detection with Autoencoders and Traffic
BadVLA: Towards Backdoor Attacks on Vision-Language-Action Models via
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation
Finetuning-Activated Backdoors in LLMs
CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from
DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection
Language-based Security and Time-inserting Supervisor
Password Strength Detection via Machine Learning: Analysis, Modeling,
Consistent and Compatible Modelling of Cyber Intrusions and Incident
Privacy-Aware Cyberterrorism Network Analysis using Graph Neural
ReCopilot: Reverse Engineering Copilot in Binary Analysis
SuperPure: Efficient Purification of Localized and Distributed
Poster: Towards an Automated Security Testing Framework for Industrial
All You Need is "Leet": Evading Hate-speech Detection AI
Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with
Verifying Differentially Private Median Estimation
A Scalable Hierarchical Intrusion Detection System for Internet of
VIVID: A Novel Approach to Remediation Prioritization in Static
SafeKey: Amplifying Aha-Moment Insights for Safety Reasoning
Outsourcing SAT-based Verification Computations in Network Security
Exte