Author of the publication

Malla: Demystifying Real-world Large Language Model Integrated Malicious Services.

, , , and . USENIX Security Symposium, USENIX Association, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)Stolen Risks of Models with Security Properties., , , , , and . CCS, page 756-770. ACM, (2023)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services., , and . DSN, page 287-298. IEEE Computer Society, (2014)Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecur., 1 (1): 14 (2018)Learning Security Classifiers with Verified Global Robustness Properties., , , , , and . CCS, page 477-494. ACM, (2021)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , and . USENIX Security Symposium, page 395-412. USENIX Association, (2022)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , and . NDSS, The Internet Society, (2021)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , and . SP, page 2176-2193. IEEE, (2022)