The Efficacy of Transformer-based Adversarial Attacks in Security Domains Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17 Security AnalysisModel DesignAdversarial Example 2023.10.17 2025.05.28 Literature Database
Harnessing the Power of LLM to Support Binary Taint Analysis Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09 Security AnalysisPrompting StrategyDynamic Analysis 2023.10.12 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 Security AnalysisNetwork SlicingMachine Learning Method 2023.10.03 2025.05.28 Literature Database
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16 Security AnalysisPrompt InjectionVulnerability Prediction 2023.10.02 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 WatermarkingSecurity AnalysisThreat modeling 2023.10.02 2025.05.28 Literature Database
LLM Censorship: A Machine Learning Challenge or a Computer Security Problem? Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20 Security AnalysisProgram VerificationAttack Method 2023.07.20 2025.05.28 Literature Database
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17 AUC EvaluationSecurity AnalysisMalware Detection with Limited Samples 2023.07.17 2025.05.28 Literature Database
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič | Published: 2023-07-13 Security AnalysisDataset GenerationEducational Data Mining 2023.07.13 2025.05.28 Literature Database
Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22 Security AnalysisMalware Detection Scenario評価メトリクス 2023.06.01 2025.09.24 Literature Database