Picture for David Mohaisen

David Mohaisen

Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis

Add code
Feb 03, 2025
Figure 1 for Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis
Figure 2 for Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis
Figure 3 for Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis
Figure 4 for Security and Quality in LLM-Generated Code: A Multi-Language, Multi-Model Analysis
Viaarxiv icon

Through the Looking Glass: LLM-Based Analysis of AR/VR Android Applications Privacy Policies

Add code
Jan 31, 2025
Viaarxiv icon

I Can Find You in Seconds! Leveraging Large Language Models for Code Authorship Attribution

Add code
Jan 14, 2025
Viaarxiv icon

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Add code
Aug 06, 2024
Figure 1 for Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis
Figure 2 for Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis
Figure 3 for Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis
Figure 4 for Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis
Viaarxiv icon

Untargeted Code Authorship Evasion with Seq2Seq Transformation

Add code
Nov 26, 2023
Viaarxiv icon

Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations

Add code
Oct 05, 2023
Figure 1 for Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations
Figure 2 for Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations
Figure 3 for Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations
Figure 4 for Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations
Viaarxiv icon

Analyzing In-browser Cryptojacking

Add code
Apr 26, 2023
Figure 1 for Analyzing In-browser Cryptojacking
Figure 2 for Analyzing In-browser Cryptojacking
Figure 3 for Analyzing In-browser Cryptojacking
Figure 4 for Analyzing In-browser Cryptojacking
Viaarxiv icon

SHIELD: Thwarting Code Authorship Attribution

Add code
Apr 26, 2023
Viaarxiv icon

Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective

Add code
Oct 27, 2022
Figure 1 for Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Figure 2 for Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Figure 3 for Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Figure 4 for Learning Location from Shared Elevation Profiles in Fitness Apps: A Privacy Perspective
Viaarxiv icon

Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

Add code
Oct 03, 2022
Figure 1 for Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Figure 2 for Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Figure 3 for Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Viaarxiv icon