Let’s Make it Personal: Customizing Threat Intelligence with Metric Learning

29:34
End-to-End Framework using LLMs for Technique Identification and Threat-Actor Attribution

26:16
Defending Against Indirect Prompt Injection Attacks With Spotlighting

19:12
Hamm-Grams: Mining Common Regular Expressions via Locality Sensitive Hashing

28:24
Structure and Semantics-Aware Malware Classification with Vision Transformers

29:11
AdapterSwap: Continuous Training of LLMs with Data Removal and Access-Control Guarantees

24:02
A Corrida para Aproveitar o Poder Alucinante da Computação Quântica | The Future com Hannah Fry

13:48
How To Learn Any Skill So Fast It Feels Illegal

20:43