SOTAVerified

Computer Security

Papers

Showing 125 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Active Anomaly Detection via EnsemblesCode1
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
Novel Feature Extraction, Selection and Fusion for Effective Malware Family ClassificationCode0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Defending Against Neural Fake NewsCode0
SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer SecurityCode0
Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data StreamsCode0
SoK: Explainable Machine Learning for Computer Security ApplicationsCode0
Robust Neural Malware Detection Models for Emulation Sequence LearningCode0
Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File FragmentsCode0
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its DescriptionCode0
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionCode0
Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary PerspectiveCode0
Pre-Training Representations of Binary Code Using Contrastive Learning0
A Neural-based Program Decompiler0
Coda: An End-to-End Neural Program Decompiler0
Detecting malicious PDF using CNN0
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks0
A LLM Assisted Exploitation of AI-Guardian0
Detecting Face Synthesis Using a Concealed Fusion Model0
Show:102550
← PrevPage 1 of 3Next →

No leaderboard results yet.