Mobile edge intelligence for large language models: A contemporary survey

G Qu, Q Chen, W Wei, Z Lin, X Chen… - … Surveys & Tutorials, 2025 - ieeexplore.ieee.org
On-device large language models (LLMs), referring to running LLMs on edge devices, have
raised considerable interest since they are more cost-effective, latency-efficient, and privacy …

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication

S Kokal, M Vanamala, R Dave - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Throughout the past several decades, mobile devices have evolved in capability and
popularity at growing rates while improvement in security has fallen behind. As smartphones …

Wafbooster: Automatic boosting of waf security against mutated malicious payloads

C Wu, J Chen, S Zhu, W Feng, K He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Web application firewall (WAF) examines malicious traffic to and from a web application via
a set of security rules. It plays a significant role in securing Web applications against web …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

That person moves like a car: Misclassification attack detection for autonomous systems using spatiotemporal consistency

Y Man, R Muller, M Li, ZB Celik, R Gerdes - 32nd USENIX Security …, 2023 - usenix.org
Autonomous systems commonly rely on object detection and tracking (ODT) to perceive the
environment and predict the trajectory of surrounding objects for planning purposes. An …

Towards effective detection of ponzi schemes on ethereum with contract runtime behavior graph

R Liang, J Chen, C Wu, K He, Y Wu, W Sun… - ACM Transactions on …, 2024 - dl.acm.org
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent
years, causing massive financial losses. Existing detection methods primarily focus on rule …

Semantic sleuth: Identifying ponzi contracts via large language models

C Wu, J Chen, Z Wang, R Liang, R Du - Proceedings of the 39th IEEE …, 2024 - dl.acm.org
Smart contracts, self-executing agreements directly encoded in code, are fundamental to
blockchain technology, especially in decentralized finance (DeFi) and Web3. However, the …

DeFFusion: CNN-based continuous authentication using deep feature fusion

Y Li, P Tao, S Deng, G Zhou - ACM Transactions on Sensor Networks …, 2021 - dl.acm.org
Smartphones have become crucial and important in our daily life, but the security and
privacy issues have been major concerns of smartphone users. In this article, we present …

Privacy-preserving universal adversarial defense for black-box models

Q Li, C Wu, J Chen, Z Zhang, K He, R Du… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep neural networks (DNNs) are increasingly used in critical applications such as identity
authentication and autonomous driving, where robustness against adversarial attacks is …

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning

C Wu, J Chen, Z Zhao, K He, G Xu, Y Wu… - Proceedings of the …, 2024 - dl.acm.org
Decentralized finance has experienced phenomenal growth, revolutionizing the landscape
of financial transactions and asset management via blockchain. Yet, this swift growth brings …