Similar Items: I can't recognize (yet): Delayed Rendering to Defeat Visual Phishing Detectors
- Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers
- Outdoor Recreation in the National Conservation Lands: “Can’t Live With It and Can’t Live Without It”
- Static Attribution of Android Residential Proxy Malware Using Graph Kernels
- REBENCH: A Procedural, Fair-by-Construction Benchmark for LLMs on Stripped-Binary Types and Names (Extended Version)
- Secret Stealing Attacks on Local LLM Fine-Tuning through Supply-Chain Model Code Backdoors
- Understanding Adversarial Transferability in Vision-Language Models for Autonomous Driving: A Cross-Architecture Analysis