SOTAVerified

Computer Security

Papers

Showing 150 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
Active Anomaly Detection via EnsemblesCode1
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection0
A Survey on Resilient Machine Learning0
AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks0
Coda: An End-to-End Neural Program Decompiler0
Pre-Training Representations of Binary Code Using Contrastive Learning0
Covert Communication Based on the Poisoning Attack in Federated Learning0
Cyber Risk in Health Facilities: A Systematic Literature Review0
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation0
Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security0
Detecting Face Synthesis Using a Concealed Fusion Model0
Detecting malicious PDF using CNN0
Dos and Don'ts of Machine Learning in Computer Security0
Poisoning Behavioral Malware Clustering0
Malicious Internet Entity Detection Using Local Graph Inference0
Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks0
A LLM Assisted Exploitation of AI-Guardian0
A Neural-based Program Decompiler0
A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem0
Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches0
Artificial Consciousness and Security0
Randomized LU decomposition: An Algorithm for Dictionaries Construction0
Revisiting Static Feature-Based Android Malware Detection0
Self-Organising Maps in Computer Security0
Stratified Graphical Models - Context-Specific Independence in Graphical Models0
TDDBench: A Benchmark for Training data detection0
The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse?0
The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI0
Topic Modeling of Hierarchical Corpora0
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models0
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots0
Expectation vs. Reality: Towards Verification of Psychological Games0
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks0
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics0
Generating Adversarial Examples with an Optimized Quality0
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling0
Generative Models for Spear Phishing Posts on Social Media0
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification0
Immune System Approaches to Intrusion Detection - A Review (ICARIS)0
Indexing AI Risks with Incidents, Issues, and Variants0
IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis0
IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM0
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.