| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 |
| Detecting Face Synthesis Using a Concealed Fusion Model | Jan 8, 2024 | Computer SecurityFace Generation | —Unverified | 0 |
| Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches | Oct 20, 2023 | Anomaly DetectionComputer Security | —Unverified | 0 |
| Detecting malicious PDF using CNN | Jul 24, 2020 | ClusteringComputer Security | —Unverified | 0 |
| Dos and Don'ts of Machine Learning in Computer Security | Oct 19, 2020 | BIG-bench Machine LearningComputer Security | —Unverified | 0 |
| Covert Communication Based on the Poisoning Attack in Federated Learning | Jun 2, 2023 | Computer SecurityFederated Learning | —Unverified | 0 |
| A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem | Jan 29, 2022 | Computer Security | —Unverified | 0 |
| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 |
| Malicious Internet Entity Detection Using Local Graph Inference | Aug 6, 2024 | Computer Security | —Unverified | 0 |