SOTAVerified

Computer Security

Papers

Showing 2650 of 66 papers

TitleStatusHype
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation0
Indexing AI Risks with Incidents, Issues, and Variants0
Pre-Training Representations of Binary Code Using Contrastive Learning0
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots0
SoK: Explainable Machine Learning for Computer Security ApplicationsCode0
IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM0
A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem0
Physical Activity Recognition by Utilising Smartphone Sensor Signals0
CVSS-BERT: Explainable Natural Language Processing to Determine the Severity of a Computer Security Vulnerability from its DescriptionCode0
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling0
Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model0
Cyber Risk in Health Facilities: A Systematic Literature Review0
Fragments Expert A Graphical User Interface MATLAB Toolbox for Classification of File FragmentsCode0
Dos and Don'ts of Machine Learning in Computer Security0
Detecting malicious PDF using CNN0
Generating Adversarial Examples with an Optimized Quality0
IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis0
Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification0
The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse?0
Coda: An End-to-End Neural Program Decompiler0
A Neural-based Program Decompiler0
Evaluating Explanation Methods for Deep Learning in SecurityCode0
Defending Against Neural Fake NewsCode0
Artificial Consciousness and Security0
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection0
Show:102550
← PrevPage 2 of 3Next →

No leaderboard results yet.