| Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection | Feb 23, 2023 | Code CompletionComputer Security | CodeCode Available | 4 |
| Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs | Feb 24, 2025 | Computer Security | CodeCode Available | 3 |
| Scaling Language Models: Methods, Analysis & Insights from Training Gopher | Dec 8, 2021 | Abstract AlgebraAnachronisms | CodeCode Available | 2 |
| CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models | Jan 2, 2025 | BenchmarkingComputer Security | CodeCode Available | 1 |
| CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching | Dec 1, 2020 | Computer SecurityCross-Modal Retrieval | CodeCode Available | 1 |
| Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active Learning | Jan 23, 2019 | Active LearningAnomaly Detection | CodeCode Available | 1 |
| Active Anomaly Detection via Ensembles | Sep 17, 2018 | Active LearningAnomaly Detection | CodeCode Available | 1 |
| The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI | Jan 30, 2025 | Computer Security | —Unverified | 0 |
| Expectation vs. Reality: Towards Verification of Psychological Games | Nov 8, 2024 | Autonomous DrivingComputer Security | —Unverified | 0 |
| TDDBench: A Benchmark for Training data detection | Nov 5, 2024 | BenchmarkingComputational Efficiency | —Unverified | 0 |