SOTAVerified

Computer Security

Papers

Showing 125 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
Active Anomaly Detection via EnsemblesCode1
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
A Neural-based Program Decompiler0
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks0
A LLM Assisted Exploitation of AI-Guardian0
Detecting malicious PDF using CNN0
Coda: An End-to-End Neural Program Decompiler0
A Survey on Resilient Machine Learning0
Pre-Training Representations of Binary Code Using Contrastive Learning0
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks0
Artificial Consciousness and Security0
Cyber Risk in Health Facilities: A Systematic Literature Review0
Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches0
A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection0
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation0
Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security0
Detecting Face Synthesis Using a Concealed Fusion Model0
Covert Communication Based on the Poisoning Attack in Federated Learning0
A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem0
Malicious Internet Entity Detection Using Local Graph Inference0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.