| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation | Feb 3, 2023 | Computer Security | —Unverified | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 |
| SoK: Explainable Machine Learning for Computer Security Applications | Aug 22, 2022 | Computer SecurityExplainable artificial intelligence | CodeCode Available | 0 |
| IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM | May 17, 2022 | Computer Architecture and SystemsComputer Security | —Unverified | 0 |
| A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem | Jan 29, 2022 | Computer Security | —Unverified | 0 |
| Physical Activity Recognition by Utilising Smartphone Sensor Signals | Jan 20, 2022 | Activity RecognitionComputer Security | —Unverified | 0 |
| Scaling Language Models: Methods, Analysis & Insights from Training Gopher | Dec 8, 2021 | Abstract AlgebraAnachronisms | CodeCode Available | 2 |