2024-04-05 21:37:46
Hackers Hijacked Notepad Plugin to Execute Malicious Code
https://gbhackers.com/hackers-hijacked-notepad-plugin-to-execute-malicious-code/
Hackers Hijacked Notepad Plugin to Execute Malicious Code
https://gbhackers.com/hackers-hijacked-notepad-plugin-to-execute-malicious-code/
The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning
Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palas…
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei
https://arxiv.org/abs/2403.02995
I've been wondering what, if any, sort of risk Lasse Collin might have been exposed to no one else would see.
For example, was there a malicious private branch Lasse tested? Reportedly JT and Lasse communicated mostly over Signal. Were any links shared and clicked on?
This edges on fantasy and conspiracy theory, but I'm hoping Lasse thinks deeply about this if he hasn't already. #xz
Developers say open-source software culture, where users demand constant updates from volunteer coders, is letting malicious actors introduce vulnerabilities (Jason Koebler/404 Media)
https://www.404media.co/xz-backdoor-bullyi
The mistery of 'Jia Tan', the mastermind behind the XZ-Utils backdoor supply-chain hack [WIRED News, April 2024]
https://www.wired.com/story/jia-tan-xz-backdoor/?ref=platformer.news
This https://arxiv.org/abs/2403.12619 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csSI_…
"""
#OpenRC […] has been in a state of bureaucratic decay for a decade now, having all been hoarded by a random corporate contractor about as responsive to the outside universe as OpenOffice (while taking up as much space; they're the entire reason for the farcical metadata/AUTHORS file in the main package repo).
"""
#Gentoo copyright policy (AKA #GLEP76) has been a long time in the making. More specifically, as you can guess from the author list, it has been a long time in fruitless debate, followed by a short period of creative activity. In its original form, it has been unanimously approved both by the Council and the Trustees in September 2018.
https://bugs.gentoo.org/653118
Not a month later, once we've actually started requiring signoffs per the new policy, one of the Council members requested a "transitional period", to give their company's legal team more time to approve it. Like, they've actively influenced the policy, they've actually voted for approving it, but they didn't mean for it to actually apply at the time — and they've never bothered telling anyone about the problem earlier. Fortunately, they've managed to get a quick approval and started using it.
https://bugs.gentoo.org/667602
As a side effect of using it, attribution lines to said company started popping up in random ebuilds that their employees touched (malicious compliance or just corporate bullshit?). This heralded a maintenance nightmare. Two months later, metadata/AUTHORS was proposed as a compromise to stop that.
https://bugs.gentoo.org/672962
All these years later, I'm thinking that we had a simpler solution to all these, and many later problems, at our disposal back then…
This Week in Deserialization: https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind.
The thwarted XZ Utils supply chain attack was years in the making. Now, clues suggest nation-state hackers were behind the persona that inserted the malicious code.
https://www.wired.com/story/jia-tan-xz-backdoor/…
This https://arxiv.org/abs/2312.14197 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCL_…
#GitHub is under attack.
“The flow of the campaign is simple:
1. Cloning existing repos (for example: TwitterFollowBot, WhatsappBOT, discord-boost-tool, Twitch-Follow-Bot, and hundreds more)
2. Infecting them with malware loaders
3. Uploading them back to GitHub with identical names
4. Automatically forking each thousands of times
5. Covertly promoting them across the …
The security of the worldwide information technology infrastructure sadly rests on tons of unpaid open source developers. 😦
https://www.theverge.com/2024/4/2/24119342/xz-utils-linux-backdoor-attempt
The mistery of 'Jia Tan', the mastermind behind the XZ-Utils backdoor supply-chain hack [WIRED News, April 2024]
https://www.wired.com/story/jia-tan-xz-backdoor/?ref=platformer.news
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
Benedict Schl\"uter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde
https://arxiv.org/abs/2404.03526
This https://arxiv.org/abs/2403.12619 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csSI_…
Distributed Estimation in Blockchain-aided Internet of Things in the Presence of Attacks
Hamid Varmazyari, Yiming Jiang, Jiangfan Zhang
https://arxiv.org/abs/2405.03665
Over 100,000 Infected Repos Found on GitHub
https://apiiro.com/blog/malicious-code-campaign-github-repo-confusion-attack/
Bullying in Open Source Software Is a Massive Security Vulnerability https://www.404media.co/xz-backdoor-bullying-in-open-source-software-is-a-massive-security-vulnerability/
Researchers detail an ongoing repo confusion attack impacting 100K GitHub repos, which involves cloning existing repos and infecting them with malware loaders (Dan Goodin/Ars Technica)
https://arstechnica.com/security/2024/
Half of internet traffic is now bots.
Hi, bot followers :-)
https://www.imperva.com/company/press_releases/bots-make-up-half-of-all-internet-traffic-globally/
Heckler: Breaking Confidential VMs with Malicious Interrupts
Benedict Schl\"uter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
https://arxiv.org/abs/2404.03387
Please watch out where you download from and go through as many steps as you can stomach to verify what you downloaded is what you intended to download. Case in point 📂📌
> One such attack chain targets users searching for Arc Browser on search engines like Google to serve bogus ads that redirect users to look-alike sites ("airci[.]net") that serve the malware.
…
This https://arxiv.org/abs/2403.16760 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csHC_…
Marsfall - Season 3 finale 🤯🫨🫠
Dramatized sci-fi action/adventure series | Total listening time: 16h 33m
Jacki and her crew left Earth and its problems behind for a chance at giving humanity a fresh start on Mars. But mysterious aliens, malicious AI, and the expected difficulties of colonizing this inhospitable planet leave t...
EU, NATO condemn cyberattacks against Germany, Czechia, blame Russia as perpetrator
https://poliverso.org/display/0477a01e-c2596e91-385a11e9b76a80d4
EU, NATO condemn cyberattacks against Germany, Czechia, blame Russia as perpetratorThe EU and NATO o…
risks of nonexistent software names cited by LLMs
"AI hallucinates software packages and devs download them – even if potentially poisoned with malware
"Simply look out for libraries imagined by ML and make them real, with actual malicious code. No wait, don't do that"
Ha!
So far no evidence it's been used for malware (yet):
"... our package is not malicious it is just an example of how easy and dangerous it could be to leverage this technique"
#AI #LLM #coding
JFrog says it found around a hundred malicious ML models on Hugging Face, some of which can backdoor users' machines (Bill Toulas/BleepingComputer)
https://www.bleepingcomputer.com/news/security/malicious-ai-models-on…
Nearly 20% of Docker Hub Repositories were used to spread malware & phishing scams https://jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/
Very interesting (and very long thread) by @… on AI, LLM booby-traps, and 'reverse-centaurism'
https://mamot.fr/@pluralistic/112196495887778…
Fascinating story about the XZ backdoor, before people start blaming opensource, these backdoors can be in any closed source component and nobody will know.
https://arstechnica.com/security/2024/04/what-we-know-about…
Looks interesting. As the article notes it isn't foolproof, but any extra protection will help.
And yes, I have UBlock origin installed.
https://www.ghacks.net/2024/02/20/google-chrome-will-soon-prev…
Ball’s in your court, @….
Apple has very publicly told you to go fuck yourselves with its malicious compliance. What you do next will decide whether malicious compliance is acceptable in the EU or not.
#apple
_“The end game would be the ability to login to every Fedora, Debian and Ubuntu box on the internet. If it isn’t a state actor it should be…”_
Cryptographer Filippo Valsorda said, _“This might be the best executed supply chain attack we’ve seen described in the open, and it’s a nightmare scenario: malicious, competent, authorized upstream in a widely used library.”_
And awesome: FOSS community catched it, because tests slowdown
CDN-hosted JS has always smelled more than a little funny to me. It’s all the problems of a library supply chain attack, except that an attacker can hot swap the malicious into your already-deployed site. Maybe only for a brief time window. Maybe only for specific regions or specific users.
https://oisaur.com/@r…
This https://arxiv.org/abs/2403.03218 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csLG_…
Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks
David Candal-Ventureira, Pablo Fondo-Ferreiro, Felipe Gil-Casti\~neira, Francisco Javier Gonz\'alez-Casta\~no
https://arxiv.org/abs/2403.19731
xz Utils
Backdoor found in widely used Linux utility breaks encrypted SSH connections | Ars Technica
https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ss…
But they are by definition all open source, so a million eyes will inspect them! The bad ones will be noticed!
(Sarcasm.)
From: @…
https://infosec.exchange/@d…
GitHub is under a major attack with millions of malicious repositories being created. https://reddit.com/r/cybersecurity/comments/1b3qr27/
This https://arxiv.org/abs/2211.06073 has been replaced.
link: https://scholar.google.com/scholar?q=a
This https://arxiv.org/abs/2403.16760 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csHC_…
This https://arxiv.org/abs/2403.14020 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Adversarial Botometer: Adversarial Analysis for Social Bot Detection
Shaghayegh Najari, Davood Rafiee, Mostafa Salehi, Reza Farahbakhsh
https://arxiv.org/abs/2405.02016
i’m sure i’m not the first to make this but i haven’t seen one yet.
(context: https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/)<…
Not his* fault! He simply found himself negotiating a contract, signing it, performing the forgery, optimizing it for the distribution method, and taking payment! He had no choice whatsoever! It must have been terrible!
https://www.cnn.com/2024/02/23/politics/de
Law Enforcement Disruption of Malicious Cyber Actors Is Gaining Steam
https://www.metacurity.com/p/law-enforcement-disruption-malicious-cyber-actors-gaining-steam
Bullying in Open Source Software Is a Massive Security Vulnerability https://www.404media.co/xz-backdoor-bullying-in-open-source-software-is-a-massive-security-vulnerability/
This https://arxiv.org/abs/2308.16639 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_ees…
A look at XZ Utils attacker "Jia Tan", a persona experts say was used by a nation state group and that left little trace after working on the project since 2021 (Wired)
https://www.wired.com/story/jia-tan-xz-backdoor/
Robust Federated Learning Mitigates Client-side Training Data Distribution Inference Attacks
Yichang Xu, Ming Yin, Minghong Fang, Neil Zhenqiang Gong
https://arxiv.org/abs/2403.03149
_“The end game would be the ability to login to every Fedora, Debian and Ubuntu box on the internet. If it isn’t a state actor it should be…”_
Cryptographer Filippo Valsorda said, _“This might be the best executed supply chain attack we’ve seen described in the open, and it’s a nightmare scenario: malicious, competent, authorized upstream in a widely used library.”_
And awesome: FOSS community catched it, because tests slowdown
Interesting #privacy issues found in iOS Safari - Could be used for easy tracking:
https://www.mysk.blog/2024/04/28/safari-tracking/
This https://arxiv.org/abs/2404.16116 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCL_…
Malicious Reconfigurable Intelligent Surfaces: How Impactful can Destructive Beamforming be?
Steven Rivetti, Ozlem Tugfe Demir, Emil Bjornson, Mikael Skoglund
https://arxiv.org/abs/2402.13351
Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of Free Proxy Services
Naif MehannaUniversity of Lille, Inria Lille, Walter RudametkinUniversity of Rennes, IUF, Pierre LaperdrixCNRS, Inria Lille, Antoine VastelDatadome
https://arxiv.org/abs/2403.02445
Researchers find malicious code in versions of the Linux compression tool XZ Utils that were incorporated into unstable distributions from Red Hat and Debian (Dan Goodin/Ars Technica)
https://arstechnica.com/security/2024/
GitHub is under a major attack with millions of malicious repositories being created. https://reddit.com/r/cybersecurity/comments/1b3qr27/
Just stop using your computers. Hmm...
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
Peregrine: ML-based Malicious Traffic Detection for Terabit Networks
Jo\~ao Romeiras Amado, Francisco Pereira, David Pissarra, Salvatore Signorello, Miguel Correia, Fernando M. V. Ramos
https://arxiv.org/abs/2403.18788
Don't miss today's packed Metacurity for the most important infosec developments you should know, including
--White House, FCC and Markey have connected car data practices in their crosshairs
--ALPHV claim of UnitedHealth attack appeared briefly,
--Epic Games and Ireland's DFA deny Mogilevich attacks,
-- Millions of malicious repos hit GitHub,
--Lazarus Group exploited AppLocker drive flaw,
-- Rhysida claims attack on children's hospital,
--Fake security warning hits 3D printers,
--Hackers target Calendly, Nearly $16 million stolen in trio of crypto hacks,
-- much more
https://www.metacurity.com/p/white-house-fcc-markey-connected-car-data-practices-crosshairs
This https://arxiv.org/abs/2403.03218 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csLG_…
Transferring Troubles: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning
Xuanli He, Jun Wang, Qiongkai Xu, Pasquale Minervini, Pontus Stenetorp, Benjamin I. P. Rubinstein, Trevor Cohn
https://arxiv.org/abs/2404.19597 https://arxiv.org/pdf/2404.19597
arXiv:2404.19597v1 Announce Type: new
Abstract: The implications of backdoor attacks on English-centric large language models (LLMs) have been widely examined - such attacks can be achieved by embedding malicious behaviors during training and activated under specific conditions that trigger malicious outputs. However, the impact of backdoor attacks on multilingual models remains under-explored. Our research focuses on cross-lingual backdoor attacks against multilingual LLMs, particularly investigating how poisoning the instruction-tuning data in one or two languages can affect the outputs in languages whose instruction-tuning data was not poisoned. Despite its simplicity, our empirical analysis reveals that our method exhibits remarkable efficacy in models like mT5, BLOOM, and GPT-3.5-turbo, with high attack success rates, surpassing 95% in several languages across various scenarios. Alarmingly, our findings also indicate that larger models show increased susceptibility to transferable cross-lingual backdoor attacks, which also applies to LLMs predominantly pre-trained on English data, such as Llama2, Llama3, and Gemma. Moreover, our experiments show that triggers can still work even after paraphrasing, and the backdoor mechanism proves highly effective in cross-lingual response settings across 25 languages, achieving an average attack success rate of 50%. Our study aims to highlight the vulnerabilities and significant security risks present in current multilingual LLMs, underscoring the emergent need for targeted security measures.
This https://arxiv.org/abs/2402.16914 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Don't miss today's Metacurity for the most critical infosec developments you should know today, including
--Researchers stopped XZ Utils-Type malicious Actors targeting three JavaScript projects
--RansomHub starts leaking Change Healthcare data,
-- Hackers stole some Cisco Duo's customers' VoIP and SMS logs,
--Cryptojacker busted for stealing cloud services,
--Chirp Systems silent on smart lock vulnerability,
--Critics question Microsoft's incentive to improve security,
--FTC slams Cerebral for sharing customers' health info with advertisers,
--Ukraine hackers claim Russian drone developer breach,
--Palo Alto rolls out fixes for zero-day,
--much more
https://www.metacurity.com/p/researchers-stopped-xz-utilstype-malicious-actors-targeting-three-javascript-projects
Microsoft engineer Andres Freund accidentally found the malicious code in versions of the XZ Utils compression tool, likely preventing thousands of infections (Mike Larkin/Security Boulevard)
https://securityboulevard.com/2024/03/
This https://arxiv.org/abs/2402.16914 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
JailBreakV-28K: A Benchmark for Assessing the Robustness of MultiModal Large Language Models against Jailbreak Attacks
Weidi Luo, Siyuan Ma, Xiaogeng Liu, Xiaoyu Guo, Chaowei Xiao
https://arxiv.org/abs/2404.03027
“SubdoMailing” — Thousands of Hijacked Major-Brand Subdomains Found Bombarding Users With Millions of Malicious Emails
https://labs.guard.io/subdomailing-thousands-of-hijacked-major-brand-subdomains-found-bombarding-users-with-millions-a5e5fb892935
This https://arxiv.org/abs/2403.03149 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Researchers detail a spam campaign using hijacked abandoned domains and subdomains from reputable brands like eBay and VMware to send ~5M malicious emails daily (Bill Toulas/BleepingComputer)
https://www.bleepingcomputer.com/news/secu
Don't miss today's Metacurity for the crucial infosec developments you might have missed over the weekend, including
--LockBit reappears, threatens to release Fulton County data by March 2 unless ransom is paid,
--Attackers actively exploit ScreenConnect servers to deploy LockBit ransomware,
--Crypto wallets show LockBit received $125 million,
--RCMP copes with cyber event,
--MicroStrategy X account hacked to steal $440K in Bitcoin,
--Hackers stole $9.7m from Axie Infinity co-founder,
--Malicious JavaScript smuggled into Tornado Cash governance proposal,
--Facial recognition data collected by M&M vending machines,
--Auto industry knew of theft risk from keyless tech,
--Biden rival consultant created voice-cloned Biden call,
--much more
https://www.metacurity.com/p/lockbit-reappears-threatens-release-fulton-county-data-march-2-unless-ransom-paid
Resecurity: in Q1, malicious cyber activities targeting the Philippines, including cyberattacks and misinfo campaigns, were up 300% YoY, as China tensions rise (Pierluigi Paganini/Security Affairs)
https://securityaffairs.com/161909/int
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies
Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing
https://arxiv.org/abs/2402.14353
Exploring Emerging Trends in 5G Malicious Traffic Analysis and Incremental Learning Intrusion Detection Strategies
Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing
https://arxiv.org/abs/2402.14353
The UK says Chinese state-affiliated actors were responsible for a "malicious cyber campaign" on the country's Electoral Commission between 2021 and 2022 (Ryan Browne/CNBC)
https://www.cnbc.com/2024/03/25/britain-bl
Effective Malware Detection for Embedded Computing Systems with Limited Exposure
Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao
https://arxiv.org/abs/2404.02344
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two companies and four individuals involved in malicious cyber activity on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC).
https://home.treasury.gov/news/press-releases/jy2292#:~:text=WASHINGTON — Today, the U.S. Department,Command (IRGC-CEC).
Exploring Backdoor Vulnerabilities of Chat Models
Yunzhuo Hao, Wenkai Yang, Yankai Lin
https://arxiv.org/abs/2404.02406 https://arxiv…
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two companies and four individuals involved in malicious cyber activity on behalf of the Iranian Islamic Revolutionary Guard Corps Cyber Electronic Command (IRGC-CEC).
https://home.treasury.gov/news/press-releases/jy2292#:~:text=WASHINGTON — Today, the U.S. Department,Command (IRGC-CEC).
Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attacks
Elena R. Henderson, Jessie M. Henderson, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton
https://arxiv.org/abs/2404.02440
Assessing LLMs in Malicious Code Deobfuscation of Real-world Malware Campaigns
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas
https://arxiv.org/abs/2404.19715 https://arxiv.org/pdf/2404.19715
arXiv:2404.19715v1 Announce Type: new
Abstract: The integration of large language models (LLMs) into various pipelines is increasingly widespread, effectively automating many manual tasks and often surpassing human capabilities. Cybersecurity researchers and practitioners have recognised this potential. Thus, they are actively exploring its applications, given the vast volume of heterogeneous data that requires processing to identify anomalies, potential bypasses, attacks, and fraudulent incidents. On top of this, LLMs' advanced capabilities in generating functional code, comprehending code context, and summarising its operations can also be leveraged for reverse engineering and malware deobfuscation. To this end, we delve into the deobfuscation capabilities of state-of-the-art LLMs. Beyond merely discussing a hypothetical scenario, we evaluate four LLMs with real-world malicious scripts used in the notorious Emotet malware campaign. Our results indicate that while not absolutely accurate yet, some LLMs can efficiently deobfuscate such payloads. Thus, fine-tuning LLMs for this task can be a viable potential for future AI-powered threat intelligence pipelines in the fight against obfuscated malware.
This https://arxiv.org/abs/2311.14496 has been replaced.
link: https://scholar.google.com/scholar?q=a
This https://arxiv.org/abs/2311.14496 has been replaced.
link: https://scholar.google.com/scholar?q=a
Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software Vendors
Esther Gal-Or, Muhammad Zia Hydari, Rahul Telang
https://arxiv.org/abs/2404.17497
This https://arxiv.org/abs/2405.00426 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Multicore DRAM Bank-& Row-Conflict Bomb for Timing Attacks in Mixed-Criticality Systems
Antonio Savino, Gautam Gala, Marcello Cinque, Gerhard Fohler
https://arxiv.org/abs/2404.01910
This https://arxiv.org/abs/2404.04991 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
Certified Adversarial Robustness of Machine Learning-based Malware Detectors via (De)Randomized Smoothing
Daniel Gibert, Luca Demetrio, Giulio Zizzo, Quan Le, Jordi Planes, Battista Biggio
https://arxiv.org/abs/2405.00392
The Reversing Machine: Reconstructing Memory Assumptions
Mohammad Sina Karvandi, Soroush Meghdadizanjani, Sima Arasteh, Saleh Khalaj Monfared, Mohammad K. Fallah, Saeid Gorgin, Jeong-A Lee, Erik van der Kouwe
https://arxiv.org/abs/2405.00298
On the Potential of RIS in the Context of PLA in Wireless Communication Systems
Hama Amin, Waqas Aman, Saif Al-Kuwari
https://arxiv.org/abs/2405.00426 http…