LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03 RAGToken Distribution AnalysisVulnerability Analysis 2025.06.12 2025.09.05 Literature Database
Toward More Generalized Malicious URL Detection Models Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09 Token Distribution AnalysisBiasImpact of Generalization 2022.02.21 2025.05.28 Literature Database
Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction Authors: Zeki Bilgin | Published: 2021-05-07 Code Change AnalysisToken Distribution AnalysisVulnerability Analysis 2021.05.07 2025.05.28 Literature Database