Showing 1–12 of 12 results
/ Date/ Name
Oct 19, 2020Dos and Don'ts of Machine Learning in Computer SecurityMay 25, 2022Misleading Deep-Fake Detection with GAN FingerprintsNov 5, 2019Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]Oct 19, 2020Against All Odds: Winning the Defense Challenge in an Evasion Competition with DiversificationDec 24, 2024On the Effectiveness of Adversarial Training on Malware ClassifiersFeb 2, 2024TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)Jun 5, 2019Evaluating Explanation Methods for Deep Learning in SecurityMar 18, 2026Post-Training Local LLM Agents for Linux Privilege Escalation with Verifiable RewardsJun 30, 2025Beyond the TESSERACT:Trustworthy Dataset Curation for Sound Evaluations of Android Malware ClassifiersApr 28, 2017Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware DetectionMar 16, 2017Fraternal Twins: Unifying Attacks on Machine Learning and Digital WatermarkingDec 10, 2025Chasing Shadows: Pitfalls in LLM Security Research