All Stories

  1. ICL-Evader: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses
  2. Detecting and Understanding the Promotion of Illicit Goods and Services on Twitter
  3. Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
  4. An Extensive Study of Residential Proxies in China