Similar Items: Mapping Partisan Fault Lines Within DAOs
- Re-Triggering Safeguards within LLMs for Jailbreak Detection
- Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers
- Static Attribution of Android Residential Proxy Malware Using Graph Kernels
- REBENCH: A Procedural, Fair-by-Construction Benchmark for LLMs on Stripped-Binary Types and Names (Extended Version)
- Secret Stealing Attacks on Local LLM Fine-Tuning through Supply-Chain Model Code Backdoors
- Understanding Adversarial Transferability in Vision-Language Models for Autonomous Driving: A Cross-Architecture Analysis