Security Analysis

The Efficacy of Transformer-based Adversarial Attacks in Security Domains

Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17
Security Analysis
Model Design
Adversarial Example

Harnessing the Power of LLM to Support Binary Taint Analysis

Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09
Security Analysis
Prompting Strategy
Dynamic Analysis

5G Network Slicing: Analysis of Multiple Machine Learning Classifiers

Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03
Security Analysis
Network Slicing
Machine Learning Method

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16
Security Analysis
Prompt Injection
Vulnerability Prediction

Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02
Watermarking
Security Analysis
Threat modeling

LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20
Security Analysis
Program Verification
Attack Method

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17
AUC Evaluation
Security Analysis
Malware Detection with Limited Samples

Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering

Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič | Published: 2023-07-13
Security Analysis
Dataset Generation
Educational Data Mining

Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments

Authors: Vishal Karanam | Published: 2023-06-14
Security Analysis
Model Performance Evaluation
Machine Learning Technology

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22
Security Analysis
Malware Detection Scenario
評価メトリクス