-
# Summary
On August 14, attackers published a series of rest-client versions from 1.6.10 to 1.6.13 using the credentials of a rest-client maintainer whose RubyGems.org account was compromised. The …
-
## Keyword: metric learning
### ShufaNet: Classification method for calligraphers who have reached the professional level
- **Authors:** Ge Yunfei, Diao Changyu, Li Min, Yu Ruohan, Qiu Linshan, Xu…
-
Google published a paper on how SHA1 [is super broken](https://shattered.io/), and by looking at how tag verification is done [in the git source](https://github.com/git/git/blob/8f60064c1f538f06e1c579…
-
Thank you for your insightful work!
I would like to ask that besides [**Rickrolling**](https://arxiv.org/abs/2211.02408) and [**Villain Diffusion**](https://arxiv.org/abs/2306.06874), if your meth…
-
# Proposal
My current observation is that Commando VM is missing a lot of tools that a penetration testing OS should come with. I have curated a list of improvements that include changes, new tools a…
-
Thank you again for your work on BackdoorLLM.
I have one question regarding the evaluation results. I noticed in your evaluation that for the COTA, both the clean accuracy and ASR were reported. H…
-
Survey Q1 + Starting thesis ```10 jan``` {job next to thesis}
Also interested in the problem of _online trust_. General intro and overview by Bruce {rockstar of security research} [Ten Risks of PKI…
-
. Single Points of Failure - The SDN controller, as a centralized entity, creates a single point of failure within the network. If the controller is compromised, the entire network can be at risk. An …
-
### Description
In order to get `typst` installable via the Debian repos, all dependencies in `Cargo.lock` need to be available at https://qa.debian.org/developer.php?email=pkg-rust-maintainers%40ali…
-
![image](https://user-images.githubusercontent.com/414141/139701982-a9ce2327-9732-48e1-8d54-c11c09cf3a3f.png)
Knowledge and practice move patterns towards more favorable quadrants. But, complacen…