Large language models (LLMs) have recently experienced tremendous popula...
Recent work has shown that Just-In-Time (JIT) compilation can introduce
...
Recent research has confirmed the feasibility of backdoor attacks in dee...
Saliency methods help to make deep neural network predictions more
inter...
A trojan backdoor is a hidden pattern typically implanted in a deep neur...
Despite its effectiveness in uncovering software defects, American Fuzzy...
Understanding and interpreting how machine learning (ML) models make
dec...
Code bloat widely exists in production-run software. Left untackled, it ...
It has been shown that rules can be extracted from highly non-linear,
re...
It is oftentimes impossible to understand how machine learning models re...
The rapid evolution of Internet-of-Things (IoT) technologies has led to ...
Online video chat services such as Chatroulette, Omegle, and vChatter th...