| LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? | Jul 20, 2023 | Computer SecurityInstruction Following | —Unverified | 0 | 0 |
| LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems | Nov 6, 2016 | Computer SecurityIntrusion Detection | —Unverified | 0 | 0 |
| Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection | May 1, 2019 | Computer SecurityVulnerability Detection | —Unverified | 0 | 0 |
| Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings | Jun 19, 2018 | Computer Security | —Unverified | 0 | 0 |
| Online Clustering of Known and Emerging Malware Families | May 6, 2024 | ClusteringComputer Security | —Unverified | 0 | 0 |
| Parallel Algorithms for Densest Subgraph Discovery Using Shared Memory Model | Feb 27, 2021 | Computer SecuritySpam detection | —Unverified | 0 | 0 |
| Physical Activity Recognition by Utilising Smartphone Sensor Signals | Jan 20, 2022 | Activity RecognitionComputer Security | —Unverified | 0 | 0 |
| Poisoning Behavioral Malware Clustering | Nov 25, 2018 | ClusteringComputer Security | —Unverified | 0 | 0 |
| Randomized LU decomposition: An Algorithm for Dictionaries Construction | Feb 17, 2015 | Computer SecurityFile Type Identification | —Unverified | 0 | 0 |
| Revisiting Static Feature-Based Android Malware Detection | Sep 11, 2024 | Android Malware DetectionComputer Security | —Unverified | 0 | 0 |