| Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection | Feb 23, 2023 | Code CompletionComputer Security | CodeCode Available | 4 |
| Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs | Feb 24, 2025 | Computer Security | CodeCode Available | 3 |
| Scaling Language Models: Methods, Analysis & Insights from Training Gopher | Dec 8, 2021 | Abstract AlgebraAnachronisms | CodeCode Available | 2 |
| Active Anomaly Detection via Ensembles | Sep 17, 2018 | Active LearningAnomaly Detection | CodeCode Available | 1 |
| CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models | Jan 2, 2025 | BenchmarkingComputer Security | CodeCode Available | 1 |
| CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching | Dec 1, 2020 | Computer SecurityCross-Modal Retrieval | CodeCode Available | 1 |
| Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active Learning | Jan 23, 2019 | Active LearningAnomaly Detection | CodeCode Available | 1 |
| A Neural-based Program Decompiler | Jun 28, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks | Mar 2, 2024 | Computer SecurityLanguage Modeling | —Unverified | 0 |
| A LLM Assisted Exploitation of AI-Guardian | Jul 20, 2023 | Computer SecurityLanguage Modeling | —Unverified | 0 |
| Detecting malicious PDF using CNN | Jul 24, 2020 | ClusteringComputer Security | —Unverified | 0 |
| Coda: An End-to-End Neural Program Decompiler | Dec 1, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| A Survey on Resilient Machine Learning | Jul 11, 2017 | BIG-bench Machine LearningBlocking | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks | Apr 6, 2017 | Computer Security | —Unverified | 0 |
| Artificial Consciousness and Security | May 11, 2019 | Computer Security | —Unverified | 0 |
| Cyber Risk in Health Facilities: A Systematic Literature Review | Feb 8, 2021 | Computer SecurityManagement | —Unverified | 0 |
| Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches | Oct 20, 2023 | Anomaly DetectionComputer Security | —Unverified | 0 |
| A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection | May 7, 2024 | Computer SecurityDeception Detection | —Unverified | 0 |
| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 |
| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 |
| Detecting Face Synthesis Using a Concealed Fusion Model | Jan 8, 2024 | Computer SecurityFace Generation | —Unverified | 0 |
| Covert Communication Based on the Poisoning Attack in Federated Learning | Jun 2, 2023 | Computer SecurityFederated Learning | —Unverified | 0 |
| A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem | Jan 29, 2022 | Computer Security | —Unverified | 0 |
| Malicious Internet Entity Detection Using Local Graph Inference | Aug 6, 2024 | Computer Security | —Unverified | 0 |