- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0003100001000000
- More
- Availability
-
23
- Author / Contributor
- Filter by Author / Creator
-
-
Liu, Yao (5)
-
Lu, Zhuo (5)
-
Xue, Jiahao (5)
-
Zhao, Shangqing (4)
-
Liu, Haiyun (2)
-
Qu, Zhe (2)
-
Han, Xiao (1)
-
Xu, Jie (1)
-
#Tyler Phillips, Kenneth E. (0)
-
#Willis, Ciara (0)
-
& Abreu-Ramos, E. D. (0)
-
& Abramson, C. I. (0)
-
& Abreu-Ramos, E. D. (0)
-
& Adams, S.G. (0)
-
& Ahmed, K. (0)
-
& Ahmed, Khadija. (0)
-
& Aina, D.K. Jr. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Aleven, V. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Large language models (LLMs) have profoundly shaped various domains, including several types of network systems. With their powerful capabilities, LLMs have recently been proposed to enhance network security. However, the development of LLMs can introduce new risks due to their potential vulnerabilities and misuse. In this paper, we are motivated to review the dual role of LLMs in network security. Our goal is to explore how LLMs impact network security and ultimately shed light on how to evaluate LLMs from a network security perspective. We further discuss several future research directions regarding how to scientifically enable LLMs to assist with network security.more » « lessFree, publicly-accessible full text available July 3, 2026
-
Liu, Haiyun; Xue, Jiahao; Zhao, Shangqing; Liu, Yao; Lu, Zhuo (, ACM)Free, publicly-accessible full text available June 29, 2026
-
Xue, Jiahao; Han, Xiao; Zhao, Shangqing; Liu, Yao; Lu, Zhuo (, IEEE)Free, publicly-accessible full text available May 19, 2026
-
Xue, Jiahao; Qu, Zhe; Xu, Jie; Liu, Yao; Lu, Zhuo (, IEEE Transactions on Mobile Computing)
-
Xue, Jiahao; Qu, Zhe; Zhao, Shangqing; Liu, Yao; Lu, Zhuo (, IEEE Conference on Computer Communications and Networks)
An official website of the United States government

Full Text Available