SOTAVerified

Computer Security

Papers

Showing 150 of 66 papers

TitleStatusHype
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionCode4
Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMsCode3
Scaling Language Models: Methods, Analysis & Insights from Training GopherCode2
Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active LearningCode1
CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language ModelsCode1
CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code MatchingCode1
Active Anomaly Detection via EnsemblesCode1
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionCode0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Novel Feature Extraction, Selection and Fusion for Effective Malware Family ClassificationCode0
Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary PerspectiveCode0
SoK: Explainable Machine Learning for Computer Security ApplicationsCode0
Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File FragmentsCode0
Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data StreamsCode0
Robust Neural Malware Detection Models for Emulation Sequence LearningCode0
SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer SecurityCode0
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its DescriptionCode0
Defending Against Neural Fake NewsCode0
Dos and Don'ts of Machine Learning in Computer Security0
Expectation vs. Reality: Towards Verification of Psychological Games0
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks0
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics0
Generating Adversarial Examples with an Optimized Quality0
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling0
Generative Models for Spear Phishing Posts on Social Media0
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification0
Immune System Approaches to Intrusion Detection - A Review (ICARIS)0
Indexing AI Risks with Incidents, Issues, and Variants0
IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis0
IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM0
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?0
LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems0
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection0
Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings0
Online Clustering of Known and Emerging Malware Families0
Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model0
Physical Activity Recognition by Utilising Smartphone Sensor Signals0
Poisoning Behavioral Malware Clustering0
Randomized LU decomposition: An Algorithm for Dictionaries Construction0
Revisiting Static Feature-Based Android Malware Detection0
Self-Organising Maps in Computer Security0
Stratified Graphical Models - Context-Specific Independence in Graphical Models0
TDDBench: A Benchmark for Training data detection0
The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse?0
The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI0
Topic Modeling of Hierarchical Corpora0
Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models0
Artificial Consciousness and Security0
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots0
Malicious Internet Entity Detection Using Local Graph Inference0
Show:102550
← PrevPage 1 of 2Next →

No leaderboard results yet.