Picture for Una-May O'Reilly

Una-May O'Reilly

Evolving Code with A Large Language Model

Add code
Jan 13, 2024
Viaarxiv icon

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Add code
Oct 10, 2023
Figure 1 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 2 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 3 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Figure 4 for LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing
Viaarxiv icon

CLAWSAT: Towards Both Robust and Accurate Code Models

Add code
Nov 22, 2022
Viaarxiv icon

Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence

Add code
Aug 05, 2021
Figure 1 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 2 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 3 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Figure 4 for Using a Collated Cybersecurity Dataset for Machine Learning and Artificial Intelligence
Viaarxiv icon

Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks

Add code
Jun 25, 2021
Figure 1 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 2 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 3 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Figure 4 for Fostering Diversity in Spatial Evolutionary Generative Adversarial Networks
Viaarxiv icon

Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation

Add code
Apr 23, 2021
Figure 1 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 2 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 3 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Figure 4 for Automating Cyber Threat Hunting Using NLP, Automated Query Generation, and Genetic Perturbation
Viaarxiv icon

Generating Adversarial Computer Programs using Optimized Obfuscations

Add code
Mar 18, 2021
Figure 1 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 2 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 3 for Generating Adversarial Computer Programs using Optimized Obfuscations
Figure 4 for Generating Adversarial Computer Programs using Optimized Obfuscations
Viaarxiv icon

Signal Propagation in a Gradient-Based and Evolutionary Learning System

Add code
Feb 10, 2021
Figure 1 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 2 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 3 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Figure 4 for Signal Propagation in a Gradient-Based and Evolutionary Learning System
Viaarxiv icon

STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code

Add code
Sep 28, 2020
Figure 1 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 2 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 3 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Figure 4 for STRATA: Building Robustness with a Simple Method for Generating Black-box Adversarial Attacks for Models of Code
Viaarxiv icon

Analyzing the Components of Distributed Coevolutionary GAN Training

Add code
Aug 03, 2020
Figure 1 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 2 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 3 for Analyzing the Components of Distributed Coevolutionary GAN Training
Figure 4 for Analyzing the Components of Distributed Coevolutionary GAN Training
Viaarxiv icon