| Self-Organising Maps in Computer Security | Aug 5, 2016 | Anomaly DetectionComputer Security | —Unverified | 0 | 0 |
| Stratified Graphical Models - Context-Specific Independence in Graphical Models | Sep 25, 2013 | Computer Security | —Unverified | 0 | 0 |
| TDDBench: A Benchmark for Training data detection | Nov 5, 2024 | BenchmarkingComputational Efficiency | —Unverified | 0 | 0 |
| The Offense-Defense Balance of Scientific Knowledge: Does Publishing AI Research Reduce Misuse? | Dec 27, 2019 | Computer Security | —Unverified | 0 | 0 |
| The Pitfalls of "Security by Obscurity" And What They Mean for Transparent AI | Jan 30, 2025 | Computer Security | —Unverified | 0 | 0 |
| Topic Modeling of Hierarchical Corpora | Sep 11, 2014 | Computer Security | —Unverified | 0 | 0 |
| Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models | Jun 2, 2024 | Computer Security | —Unverified | 0 | 0 |
| Artificial Consciousness and Security | May 11, 2019 | Computer Security | —Unverified | 0 | 0 |
| Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots | Sep 7, 2022 | ChatbotComputer Security | —Unverified | 0 | 0 |
| Malicious Internet Entity Detection Using Local Graph Inference | Aug 6, 2024 | Computer Security | —Unverified | 0 | 0 |