| Generating Adversarial Examples with an Optimized Quality | Jun 30, 2020 | Adversarial AttackComputer Security | —Unverified | 0 |
| IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis | Jun 18, 2020 | Computer SecurityProgram Synthesis | —Unverified | 0 |
| Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification | Apr 10, 2020 | ClassificationComputer Security | —Unverified | 0 |
| The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse? | Dec 27, 2019 | Computer Security | —Unverified | 0 |
| Coda: An End-to-End Neural Program Decompiler | Dec 1, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| A Neural-based Program Decompiler | Jun 28, 2019 | Computer SecurityMalware Detection | —Unverified | 0 |
| Evaluating Explanation Methods for Deep Learning in Security | Jun 5, 2019 | Computer SecurityDeep Learning | CodeCode Available | 0 |
| Defending Against Neural Fake News | May 29, 2019 | Computer SecurityFake News Detection | CodeCode Available | 0 |
| Artificial Consciousness and Security | May 11, 2019 | Computer Security | —Unverified | 0 |
| Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection | May 1, 2019 | Computer SecurityVulnerability Detection | —Unverified | 0 |