SOTAVerified

Computer Security

Papers

Showing 110 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
Active Anomaly Detection via EnsemblesCode1
The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI0
Expectation vs. Reality: Towards Verification of Psychological Games0
TDDBench: A Benchmark for Training data detection0
Show:102550
← PrevPage 1 of 7Next →

No leaderboard results yet.