| Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection | Feb 23, 2023 | Code CompletionComputer Security | CodeCode Available | 4 | 5 |
| Emergent Misalignment: Narrow finetuning can produce broadly misaligned LLMs | Feb 24, 2025 | Computer Security | CodeCode Available | 3 | 5 |
| Scaling Language Models: Methods, Analysis & Insights from Training Gopher | Dec 8, 2021 | Abstract AlgebraAnachronisms | CodeCode Available | 2 | 5 |
| Effectiveness of Tree-based Ensembles for Anomaly Discovery: Insights, Batch and Streaming Active Learning | Jan 23, 2019 | Active LearningAnomaly Detection | CodeCode Available | 1 | 5 |
| CySecBench: Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models | Jan 2, 2025 | BenchmarkingComputer Security | CodeCode Available | 1 | 5 |
| CodeCMR: Cross-Modal Retrieval For Function-Level Binary Source Code Matching | Dec 1, 2020 | Computer SecurityCross-Modal Retrieval | CodeCode Available | 1 | 5 |
| Active Anomaly Detection via Ensembles | Sep 17, 2018 | Active LearningAnomaly Detection | CodeCode Available | 1 | 5 |
| Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection | Aug 22, 2017 | Computer SecurityGraph Embedding | CodeCode Available | 0 | 5 |
| Evaluating Explanation Methods for Deep Learning in Security | Jun 5, 2019 | Computer SecurityDeep Learning | CodeCode Available | 0 | 5 |
| Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | Nov 13, 2015 | Computer SecurityGeneral Classification | CodeCode Available | 0 | 5 |
| Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary Perspective | May 4, 2023 | Causal InferenceComputer Security | CodeCode Available | 0 | 5 |
| SoK: Explainable Machine Learning for Computer Security Applications | Aug 22, 2022 | Computer SecurityExplainable artificial intelligence | CodeCode Available | 0 | 5 |
| Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File Fragments | Dec 23, 2020 | ClassificationComputer Security | CodeCode Available | 0 | 5 |
| Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data Streams | Sep 7, 2017 | Computer SecurityDrift Detection | CodeCode Available | 0 | 5 |
| Robust Neural Malware Detection Models for Emulation Sequence Learning | Jun 28, 2018 | Computer SecurityMalware Classification | CodeCode Available | 0 | 5 |
| SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security | Dec 26, 2023 | Computer SecurityMultiple-choice | CodeCode Available | 0 | 5 |
| CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description | Nov 16, 2021 | Computer Security | CodeCode Available | 0 | 5 |
| Defending Against Neural Fake News | May 29, 2019 | Computer SecurityFake News Detection | CodeCode Available | 0 | 5 |
| Dos and Don'ts of Machine Learning in Computer Security | Oct 19, 2020 | BIG-bench Machine LearningComputer Security | —Unverified | 0 | 0 |
| Expectation vs. Reality: Towards Verification of Psychological Games | Nov 8, 2024 | Autonomous DrivingComputer Security | —Unverified | 0 | 0 |
| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 | 0 |
| From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics | Mar 6, 2024 | Computer Security | —Unverified | 0 | 0 |
| Generating Adversarial Examples with an Optimized Quality | Jun 30, 2020 | Adversarial AttackComputer Security | —Unverified | 0 | 0 |
| Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling | Aug 16, 2021 | Computer Security | —Unverified | 0 | 0 |
| Generative Models for Spear Phishing Posts on Social Media | Feb 14, 2018 | ClusteringComputer Security | —Unverified | 0 | 0 |
| Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification | Apr 10, 2020 | ClassificationComputer Security | —Unverified | 0 | 0 |
| Immune System Approaches to Intrusion Detection - A Review (ICARIS) | May 30, 2013 | Computer SecurityIntrusion Detection | —Unverified | 0 | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 | 0 |
| IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis | Jun 18, 2020 | Computer SecurityProgram Synthesis | —Unverified | 0 | 0 |
| IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM | May 17, 2022 | Computer Architecture and SystemsComputer Security | —Unverified | 0 | 0 |
| LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? | Jul 20, 2023 | Computer SecurityInstruction Following | —Unverified | 0 | 0 |
| LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems | Nov 6, 2016 | Computer SecurityIntrusion Detection | —Unverified | 0 | 0 |
| Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection | May 1, 2019 | Computer SecurityVulnerability Detection | —Unverified | 0 | 0 |
| Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings | Jun 19, 2018 | Computer Security | —Unverified | 0 | 0 |
| Online Clustering of Known and Emerging Malware Families | May 6, 2024 | ClusteringComputer Security | —Unverified | 0 | 0 |
| Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model | Feb 27, 2021 | Computer SecuritySpam detection | —Unverified | 0 | 0 |
| Physical Activity Recognition by Utilising Smartphone Sensor Signals | Jan 20, 2022 | Activity RecognitionComputer Security | —Unverified | 0 | 0 |
| Poisoning Behavioral Malware Clustering | Nov 25, 2018 | ClusteringComputer Security | —Unverified | 0 | 0 |
| Randomized LU decomposition: An Algorithm for Dictionaries Construction | Feb 17, 2015 | Computer SecurityFile Type Identification | —Unverified | 0 | 0 |
| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 | 0 |
| Self-Organising Maps in Computer Security | Aug 5, 2016 | Anomaly DetectionComputer Security | —Unverified | 0 | 0 |
| Stratified Graphical Models - Context-Specific Independence in Graphical Models | Sep 25, 2013 | Computer Security | —Unverified | 0 | 0 |
| TDDBench: A Benchmark for Training data detection | Nov 5, 2024 | BenchmarkingComputational Efficiency | —Unverified | 0 | 0 |
| The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse? | Dec 27, 2019 | Computer Security | —Unverified | 0 | 0 |
| The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI | Jan 30, 2025 | Computer Security | —Unverified | 0 | 0 |
| Topic Modeling of Hierarchical Corpora | Sep 11, 2014 | Computer Security | —Unverified | 0 | 0 |
| Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models | Jun 2, 2024 | Computer Security | —Unverified | 0 | 0 |
| Artificial Consciousness and Security | May 11, 2019 | Computer Security | —Unverified | 0 | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 | 0 |
| Malicious Internet Entity Detection Using Local Graph Inference | Aug 6, 2024 | Computer Security | —Unverified | 0 | 0 |