| A LLM Assisted Exploitation of AI-Guardian | Jul 20, 2023 | Computer SecurityLanguage Modeling | —Unverified | 0 |
| LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? | Jul 20, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Covert Communication Based on the Poisoning Attack in Federated Learning | Jun 2, 2023 | Computer SecurityFederated Learning | —Unverified | 0 |
| Understand Waiting Time in Transaction Fee Mechanism: An Interdisciplinary Perspective | May 4, 2023 | Causal InferenceComputer Security | CodeCode Available | 0 |
| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 |
| SoK: Explainable Machine Learning for Computer Security Applications | Aug 22, 2022 | Computer SecurityExplainable artificial intelligence | CodeCode Available | 0 |