| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 |
| SoK: Explainable Machine Learning for Computer Security Applications | Aug 22, 2022 | Computer SecurityExplainable artificial intelligence | CodeCode Available | 0 |
| IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM | May 17, 2022 | Computer Architecture and SystemsComputer Security | —Unverified | 0 |
| A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem | Jan 29, 2022 | Computer Security | —Unverified | 0 |
| Physical Activity Recognition by Utilising Smartphone Sensor Signals | Jan 20, 2022 | Activity RecognitionComputer Security | —Unverified | 0 |
| CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its Description | Nov 16, 2021 | Computer Security | CodeCode Available | 0 |
| Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling | Aug 16, 2021 | Computer Security | —Unverified | 0 |
| Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model | Feb 27, 2021 | Computer SecuritySpam detection | —Unverified | 0 |
| Cyber Risk in Health Facilities: A Systematic Literature Review | Feb 8, 2021 | Computer SecurityManagement | —Unverified | 0 |
| Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File Fragments | Dec 23, 2020 | ClassificationComputer Security | CodeCode Available | 0 |
| Dos and Don'ts of Machine Learning in Computer Security | Oct 19, 2020 | BIG-bench Machine LearningComputer Security | —Unverified | 0 |
| Detecting malicious PDF using CNN | Jul 24, 2020 | ClusteringComputer Security | —Unverified | 0 |
| Generating Adversarial Examples with an Optimized Quality | Jun 30, 2020 | Adversarial AttackComputer Security | —Unverified | 0 |
| IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis | Jun 18, 2020 | Computer SecurityProgram Synthesis | —Unverified | 0 |
| Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification | Apr 10, 2020 | ClassificationComputer Security | —Unverified | 0 |
| The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse? | Dec 27, 2019 | Computer Security | —Unverified | 0 |
| Coda: An End-to-End Neural Program Decompiler | Dec 1, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| A Neural-based Program Decompiler | Jun 28, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| Evaluating Explanation Methods for Deep Learning in Security | Jun 5, 2019 | Computer SecurityDeep Learning | CodeCode Available | 0 |
| Defending Against Neural Fake News | May 29, 2019 | Computer SecurityFake News Detection | CodeCode Available | 0 |
| Artificial Consciousness and Security | May 11, 2019 | Computer Security | —Unverified | 0 |
| Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection | May 1, 2019 | Computer SecurityVulnerability Detection | —Unverified | 0 |