| Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs | Feb 24, 2025 | Computer Security | CodeCode Available | 3 |
| The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI | Jan 30, 2025 | Computer Security | —Unverified | 0 |
| CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models | Jan 2, 2025 | BenchmarkingComputer Security | CodeCode Available | 1 |
| Expectation vs. Reality: Towards Verification of Psychological Games | Nov 8, 2024 | Autonomous DrivingComputer Security | —Unverified | 0 |
| TDDBench: A Benchmark for Training data detection | Nov 5, 2024 | BenchmarkingComputational Efficiency | —Unverified | 0 |
| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 |
| Malicious Internet Entity Detection Using Local Graph Inference | Aug 6, 2024 | Computer Security | —Unverified | 0 |
| Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models | Jun 2, 2024 | Computer Security | —Unverified | 0 |
| A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection | May 7, 2024 | Computer SecurityDeception Detection | —Unverified | 0 |
| Online Clustering of Known and Emerging Malware Families | May 6, 2024 | ClusteringComputer Security | —Unverified | 0 |
| From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics | Mar 6, 2024 | Computer Security | —Unverified | 0 |
| AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks | Mar 2, 2024 | Computer SecurityLanguage Modeling | —Unverified | 0 |
| Detecting Face Synthesis Using a Concealed Fusion Model | Jan 8, 2024 | Computer SecurityFace Generation | —Unverified | 0 |
| SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security | Dec 26, 2023 | Computer SecurityMultiple-choice | CodeCode Available | 0 |
| Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches | Oct 20, 2023 | Anomaly DetectionComputer Security | —Unverified | 0 |
| A LLM Assisted Exploitation of AI-Guardian | Jul 20, 2023 | Computer SecurityLanguage Modeling | —Unverified | 0 |
| LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? | Jul 20, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Covert Communication Based on the Poisoning Attack in Federated Learning | Jun 2, 2023 | Computer SecurityFederated Learning | —Unverified | 0 |
| Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary Perspective | May 4, 2023 | Causal InferenceComputer Security | CodeCode Available | 0 |
| Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection | Feb 23, 2023 | Code CompletionComputer Security | CodeCode Available | 4 |
| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 |