Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16

Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis

Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02

Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02

Learning Type Inference for Enhanced Dataflow Analysis

Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04

Performance evaluation of Machine learning algorithms for Intrusion Detection System

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01

Towards LLM-based Fact Verification on News Claims with a Hierarchical Step-by-Step Prompting Method

Authors: Xuan Zhang, Wei Gao | Published: 2023-09-30

The Lipschitz-Variance-Margin Tradeoff for Enhanced Randomized Smoothing

Authors: Blaise Delattre, Alexandre Araujo, Quentin Barthélemy, Alexandre Allauzen | Published: 2023-09-28 | Updated: 2024-03-18

A Primer on Bayesian Neural Networks: Review and Debates

Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2024-02-01

Watch Your Language: Investigating Content Moderation with Large Language Models

Authors: Deepak Kumar, Yousef AbuHashem, Zakir Durumeric | Published: 2023-09-25 | Updated: 2024-01-17