Vulnerability Detection


Vulnerability detection is the process of identifying security vulnerabilities in software applications or systems.

CGP-Tuning: Structure-Aware Soft Prompt Tuning for Code Vulnerability Detection

Add code
Jan 08, 2025
Viaarxiv icon

How to Select Pre-Trained Code Models for Reuse? A Learning Perspective

Add code
Jan 07, 2025
Figure 1 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 2 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 3 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 4 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Viaarxiv icon

Gradient Purification: Defense Against Poisoning Attack in Decentralized Federated Learning

Add code
Jan 08, 2025
Viaarxiv icon

Predicting Vulnerability to Malware Using Machine Learning Models: A Study on Microsoft Windows Machines

Add code
Jan 05, 2025
Figure 1 for Predicting Vulnerability to Malware Using Machine Learning Models: A Study on Microsoft Windows Machines
Figure 2 for Predicting Vulnerability to Malware Using Machine Learning Models: A Study on Microsoft Windows Machines
Figure 3 for Predicting Vulnerability to Malware Using Machine Learning Models: A Study on Microsoft Windows Machines
Figure 4 for Predicting Vulnerability to Malware Using Machine Learning Models: A Study on Microsoft Windows Machines
Viaarxiv icon

OpenLKA: an open dataset of lane keeping assist from market autonomous vehicles

Add code
Jan 06, 2025
Figure 1 for OpenLKA: an open dataset of lane keeping assist from market autonomous vehicles
Figure 2 for OpenLKA: an open dataset of lane keeping assist from market autonomous vehicles
Figure 3 for OpenLKA: an open dataset of lane keeping assist from market autonomous vehicles
Figure 4 for OpenLKA: an open dataset of lane keeping assist from market autonomous vehicles
Viaarxiv icon

GCP: Guarded Collaborative Perception with Spatial-Temporal Aware Malicious Agent Detection

Add code
Jan 05, 2025
Viaarxiv icon

Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models

Add code
Jan 03, 2025
Figure 1 for Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models
Figure 2 for Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models
Figure 3 for Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models
Figure 4 for Auto-RT: Automatic Jailbreak Strategy Exploration for Red-Teaming Large Language Models
Viaarxiv icon

Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models

Add code
Jan 05, 2025
Figure 1 for Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models
Figure 2 for Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models
Figure 3 for Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models
Figure 4 for Backdoor Token Unlearning: Exposing and Defending Backdoors in Pretrained Language Models
Viaarxiv icon

Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions

Add code
Jan 03, 2025
Figure 1 for Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions
Figure 2 for Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions
Figure 3 for Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions
Figure 4 for Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions
Viaarxiv icon

BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction

Add code
Jan 03, 2025
Viaarxiv icon