| Generating Adversarial Examples with an Optimized Quality | Jun 30, 2020 | Adversarial AttackComputer Security | —Unverified | 0 |
| Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling | Aug 16, 2021 | Computer Security | —Unverified | 0 |
| Generative Models for Spear Phishing Posts on Social Media | Feb 14, 2018 | ClusteringComputer Security | —Unverified | 0 |
| Exploring Optimal Deep Learning Models for Image-based Malware Variant Classification | Apr 10, 2020 | ClassificationComputer Security | —Unverified | 0 |
| Immune System Approaches to Intrusion Detection - A Review (ICARIS) | May 30, 2013 | Computer SecurityIntrusion Detection | —Unverified | 0 |
| Indexing AI Risks with Incidents, Issues, and Variants | Nov 18, 2022 | Computer Security | —Unverified | 0 |
| IReEn: Reverse-Engineering of Black-Box Functions via Iterative Neural Program Synthesis | Jun 18, 2020 | Computer SecurityProgram Synthesis | —Unverified | 0 |
| IR-ORAM: Path Access Type Based Memory Intensity Reduction for Path-ORAM | May 17, 2022 | Computer Architecture and SystemsComputer Security | —Unverified | 0 |
| LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? | Jul 20, 2023 | Computer SecurityInstruction Following | —Unverified | 0 |
| LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems | Nov 6, 2016 | Computer SecurityIntrusion Detection | —Unverified | 0 |