Guest Editorial: Hardware Reverse Engineering and Obfuscation [PDF]
Domenic Forte, Yousef Iskander
openaire +1 more source
Human tests for machine models: What lies “Beyond the Imitation Game”?
Abstract Benchmarking large language models (LLMs) is a key practice for evaluating their capabilities and risks. This paper considers the development of “BIG Bench,” a crowdsourced benchmark designed to test LLMs “Beyond the Imitation Game.” Drawing on linguistic anthropological and ethnographic analysis of the project's GitHub repository, we examine ...
Noya Kohavi, Anna Weichselbraun
wiley +1 more source
Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking. [PDF]
Li X, Lee J, Son J, Lee Y.
europepmc +1 more source
A User-Centric Context-Aware Framework for Real-Time Optimisation of Multimedia Data Privacy Protection, and Information Retention Within Multimodal AI Systems. [PDF]
Topalli N, Badii A.
europepmc +1 more source
Privacy-Aware Meta-Optics for Person Detection. [PDF]
Tasneem Z +4 more
europepmc +1 more source
NEF-DHR: A Non-Equivalent Functional Dynamic Heterogeneous Redundancy Architecture for Endogenous Safety and Security. [PDF]
Jiang B, Kang Y, Cai H.
europepmc +1 more source
Plagiarism detection across languages: a comprehensive study of Arabic and English-to-Arabic long documents. [PDF]
Abdelaal A +4 more
europepmc +1 more source
Medical data sharing and synthetic clinical data generation - maximizing biomedical resource utilization and minimizing participant re-identification risks. [PDF]
Marino S +11 more
europepmc +1 more source
Efficient feature ranked hybrid framework for android Iot malware detection. [PDF]
Saeed NH +3 more
europepmc +1 more source

