Abstract: Cooperative jamming (CJ) can shield communication signals in the presence of eavesdroppers, which has received great interest in 6G wireless networks for physical layer security. The ...
In this paper, we propose a novel approach, named Budget and Frequency Controlled Cost-Aware Model Extraction Attack (BECOME), for extracting black-box sequential recommenders, which extends the ...
Binary code analysis is the foundation of crucial tasks in the security domain; thus building effective binary analysis techniques is more important than ever. Large language models (LLMs) although ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results