SOTAVerified

Computer Security

Papers

Showing 150 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
Active Anomaly Detection via EnsemblesCode1
The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI0
Expectation vs. Reality: Towards Verification of Psychological Games0
TDDBench: A Benchmark for Training data detection0
Revisiting Static Feature-Based Android Malware Detection0
Malicious Internet Entity Detection Using Local Graph Inference0
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models0
A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection0
Online Clustering of Known and Emerging Malware Families0
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics0
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks0
Detecting Face Synthesis Using a Concealed Fusion Model0
SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer SecurityCode0
Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches0
A LLM Assisted Exploitation of AI-Guardian0
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?0
Covert Communication Based on the Poisoning Attack in Federated Learning0
Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary PerspectiveCode0
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks0
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation0
Indexing AI Risks with Incidents, Issues, and Variants0
Pre-Training Representations of Binary Code Using Contrastive Learning0
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots0
SoK: Explainable Machine Learning for Computer Security ApplicationsCode0
IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM0
A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem0
Physical Activity Recognition by Utilising Smartphone Sensor Signals0
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its DescriptionCode0
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling0
Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model0
Cyber Risk in Health Facilities: A Systematic Literature Review0
Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File FragmentsCode0
Dos and Don'ts of Machine Learning in Computer Security0
Detecting malicious PDF using CNN0
Generating Adversarial Examples with an Optimized Quality0
IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis0
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification0
The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse?0
Coda: An End-to-End Neural Program Decompiler0
A Neural-based Program Decompiler0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Defending Against Neural Fake NewsCode0
Artificial Consciousness and Security0
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.