Picture for Panos Papadimitratos

Panos Papadimitratos

Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing

Add code
Mar 27, 2025
Viaarxiv icon

GNSS jammer localization and identification with airborne commercial GNSS receivers

Add code
Mar 26, 2025
Viaarxiv icon

UnReference: analysis of the effect of spoofing on RTK reference stations for connected rovers

Add code
Mar 26, 2025
Viaarxiv icon

LLMs Have Rhythm: Fingerprinting Large Language Models Using Inter-Token Times and Network Traffic Analysis

Add code
Feb 27, 2025
Viaarxiv icon

CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models

Add code
Jan 02, 2025
Figure 1 for CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
Figure 2 for CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
Figure 3 for CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
Figure 4 for CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
Viaarxiv icon

Edge AI-based Radio Frequency Fingerprinting for IoT Networks

Add code
Dec 13, 2024
Viaarxiv icon

Extending RAIM with a Gaussian Mixture of Opportunistic Information

Add code
Feb 05, 2024
Viaarxiv icon

Challenges of Radio Frequency Fingerprinting: From Data Collection to Deployment

Add code
Oct 25, 2023
Viaarxiv icon

Probabilistic Detection of GNSS Spoofing using Opportunistic Information

Add code
May 09, 2023
Viaarxiv icon

Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer

Add code
May 03, 2023
Figure 1 for Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer
Figure 2 for Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer
Figure 3 for Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer
Figure 4 for Using Mobile Phones for Participatory Detection and Localization of a GNSS Jammer
Viaarxiv icon