| A Neural-based Program Decompiler | Jun 28, 2019 | Computer SecurityMalware Detection | —Unverified | 0 | 0 |
| Coda: An End-to-End Neural Program Decompiler | Dec 1, 2019 | Computer SecurityMalware Detection | —Unverified | 0 | 0 |
| Detecting malicious PDF using CNN | Jul 24, 2020 | ClusteringComputer Security | —Unverified | 0 | 0 |
| AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks | Mar 2, 2024 | Computer SecurityLanguage Modeling | —Unverified | 0 | 0 |
| Dos and Don'ts of Machine Learning in Computer Security | Oct 19, 2020 | BIG-bench Machine LearningComputer Security | —Unverified | 0 | 0 |
| A LLM Assisted Exploitation of AI-Guardian | Jul 20, 2023 | Computer SecurityLanguage Modeling | —Unverified | 0 | 0 |
| Detecting Face Synthesis Using a Concealed Fusion Model | Jan 8, 2024 | Computer SecurityFace Generation | —Unverified | 0 | 0 |
| Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks | Feb 11, 2023 | Computer SecurityInstruction Following | —Unverified | 0 | 0 |
| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 | 0 |
| A Survey on Resilient Machine Learning | Jul 11, 2017 | BIG-bench Machine LearningBlocking | —Unverified | 0 | 0 |