| Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection | Feb 23, 2023 | Code CompletionComputer Security | CodeCode Available | 4 | 5 |
| Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs | Feb 24, 2025 | Computer Security | CodeCode Available | 3 | 5 |
| Scaling Language Models: Methods, Analysis & Insights from Training Gopher | Dec 8, 2021 | Abstract AlgebraAnachronisms | CodeCode Available | 2 | 5 |
| Active Anomaly Detection via Ensembles | Sep 17, 2018 | Active LearningAnomaly Detection | CodeCode Available | 1 | 5 |
| CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models | Jan 2, 2025 | BenchmarkingComputer Security | CodeCode Available | 1 | 5 |
| CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching | Dec 1, 2020 | Computer SecurityCross-Modal Retrieval | CodeCode Available | 1 | 5 |
| Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active Learning | Jan 23, 2019 | Active LearningAnomaly Detection | CodeCode Available | 1 | 5 |
| Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File Fragments | Dec 23, 2020 | ClassificationComputer Security | CodeCode Available | 0 | 5 |
| Defending Against Neural Fake News | May 29, 2019 | Computer SecurityFake News Detection | CodeCode Available | 0 | 5 |
| CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description | Nov 16, 2021 | Computer Security | CodeCode Available | 0 | 5 |