Albin Forsberg, Leonardo Horn Iwaya Security Analysis of Top-Ranked mHealth Fitness Apps: An Empirical Study https://arxiv.org/abs/2409.18528
Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zheng Wang, Yunchuan Guo Towards Personal Data Sharing Autonomy:A Task-driven Data Capsule Sharing System https://arxiv.org/abs/2409.18449
Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation https://arxiv.org/abs/2409.18403
Arshiya Khan, Guannan Liu, Xing Gao Code Vulnerability Repair with Large Language Model using Context-Aware Prompt Tuning https://arxiv.org/abs/2409.18395
Quang Cao, Katerina Vgena, Aikaterini-Georgia Mavroeidi, Christos Kalloniatis, Xun Yi, Son Hoang Dau Architecture for Protecting Data Privacy in Decentralized Social Networks https://arxiv.org/abs/2409.18360
LD Herrera, London Van Sickle, Ashley Podhradsky Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced Scams https://arxiv.org/abs/2409.18249
Pedram MohajerAnsari, Alkim Domeke, Jan de Voor, Arkajyoti Mitra, Grace Johnson, Amir Salarpour, Habeeb Olufowobi, Mohammad Hamad, Mert D. Pes\'e Discovering New Shadow Patterns for Black-Box Attacks on Lane Detection of Autonomous Vehicles https://arxiv.org/abs/2409.18248
Likai Yao, Qinxuan Shi, Zhanglong Yang, Sicong Shao, Salim Hariri Development of an Edge Resilient ML Ensemble to Tolerate ICS Adversarial Attacks https://arxiv.org/abs/2409.18244
Kyle Stein, Arash Mahyari, Guillermo Francia III, Eman El-Sheikh Revolutionizing Payload Inspection: A Self-Supervised Journey to Precision with Few Shots https://arxiv.org/abs/2409.18219
Tiansheng Huang, Sihao Hu, Fatih Ilhan, Selim Furkan Tekin, Ling Liu Harmful Fine-tuning Attacks and Defenses for Large Language Models: A Survey https://arxiv.org/abs/2409.18169