Similar Items: On the Security of Research Artifacts
- On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference
- Securing the Web with HSTS-Enforced
- Secure Cross-Silo Synthetic Genomic Data Generation
- Internet of Things Security: A Survey on Common Attacks
- SILMARILS: Information-Theoretic and Quantum-Secure Designated-Verifier Signatures
- Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software