| Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks | Apr 6, 2017 | Computer Security | —Unverified | 0 | 0 |
| A LLM Assisted Exploitation of AI-Guardian | Jul 20, 2023 | Computer SecurityLanguage Modeling | —Unverified | 0 | 0 |
| A Neural-based Program Decompiler | Jun 28, 2019 | Computer SecurityMalware Detection | —Unverified | 0 | 0 |
| A new Sparse Auto-encoder based Framework using Grey Wolf Optimizer for Data Classification Problem | Jan 29, 2022 | Computer Security | —Unverified | 0 | 0 |
| Anomaly Detection of Command Shell Sessions based on DistilBERT: Unsupervised and Supervised Approaches | Oct 20, 2023 | Anomaly DetectionComputer Security | —Unverified | 0 | 0 |
| A Roadmap for Multilingual, Multimodal Domain Independent Deception Detection | May 7, 2024 | Computer SecurityDeception Detection | —Unverified | 0 | 0 |
| A Survey on Resilient Machine Learning | Jul 11, 2017 | BIG-bench Machine LearningBlocking | —Unverified | 0 | 0 |
| AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks | Mar 2, 2024 | Computer SecurityLanguage Modeling | —Unverified | 0 | 0 |
| Coda: An End-to-End Neural Program Decompiler | Dec 1, 2019 | Computer SecurityMalware Detection | —Unverified | 0 | 0 |
| Pre-Training Representations of Binary Code Using Contrastive Learning | Oct 11, 2022 | Code SummarizationComputer Security | —Unverified | 0 | 0 |