


default search action
CAMLIS 2024: Arlington, VA, USA
- Rachel Allen, Sagar Samtani, Edward Raff, Ethan M. Rudd:
Proceedings of the Conference on Applied Machine Learning in Information Security (CAMLIS 2024), Arlington, Virginia, USA, October 24-25, 2024. CEUR Workshop Proceedings 3920, CEUR-WS.org 2025 - Amelia Kawasaki, Andrew Davis, Houssam Abbas:
Defending Large Language Models Against Attacks With Residual Stream Activation Analysis. 1-15 - Manuel B. Santos, Dimitris Mouris, Mehmet Ugurbil, Stanislaw Jarecki, José Reis, Shubho Sengupta, Miguel de Vega:
Curl: Private LLMs through Wavelet-Encoded Look-Up Tables. 16-47 - Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman:
Defending Against Indirect Prompt Injection Attacks With Spotlighting. 48-62 - Madeline Cheah, Jack Stone, Samuel Bailey, Peter Haubrick, David Rimmer, Matt Lacey, Mark Dorn:
Towards autonomous cyber-defence: using co-operative decision making for cybersecurity. 63-82 - Nathan Ross, Oluwafemi Olukoya, Jesús Martínez del Rincón, Domhnall Carlin:
PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware. 83-113 - Alec Wilson, William Holmes, Ryan Menzies, Kez Smithson Whitehead:
Applying Action Masking and Curriculum Learning Techniques to Improve Data Efficiency and Overall Performance in Operational Technology Cyber Security using Reinforcement Learning. 114-128 - Numan Halit Guldemir, Oluwafemi Olukoya, Jesús Martínez del Rincón:
Navigating Concept Drift and Packing Complexity in Malware Family Classification. 129-144 - Kaixi Yang, Paul Miller, Jesús Martinez del Rincón:
DIP-ECOD: Improving Anomaly Detection in Multimodal Distributions. 145-160 - Tadesse Zemicheal, Hsin Chen, Shawn Davis, Rachel Allen, Michael Demoret, Ashley Song:
LLM agents for vulnerability identification and verification of CVEs. 161-173 - Prajna Bhandary, Robert J. Joyce, Charles Nicholas:
Ransomware Evolution: Unveiling Patterns Using HDBSCAN. 174-189 - Manish Marwah, Asad Narayanan, Stephan Jou, Martin F. Arlitt, Maria Pospelova:
Is 퐹1 Score Suboptimal for Cybersecurity Models? Introducing 퐶푠푐표푟푒, a Cost-Aware Alternative for Model Assessment. 190-209 - William Fleshman, Benjamin Van Durme:
AdapterSwap: Continuous Training of LLMs with Data Removal and Access-Control Guarantees. 210-223 - Gary D. Lopez Munoz, Amanda J. Minnich, Roman Lutz, Richard Lundeen, Raja Sekhar Rao Dheekonda, Nina Chikanov, Bolor-Erdene Jagdagdorj, Martin Pouliot, Shiven Chawla, Whitney Maxwell, Blake Bullwinkel, Katherine Pratt, Joris de Gruyter, Charlotte Siska, Pete Bryan, Tori Westerhoff, Chang Kawaguchi, Christian Seifert, Ram Shankar Siva Kumar, Yonatan Zunger:
PyRIT: A Framework for Security Risk Identification and Red Teaming in Generative AI Systems. 224-241 - Kincaid MacDonald, Ajai Ruparelia, Boomer Rogers, Adonis Bovell, Branden Stone:
Binary Malware Attribution using LLM Embeddings and Topological Data Analysis. 242-256 - Md. Ahsan Ayub, Subhabrata Majumdar:
Embedding-based classifiers can detect prompt injection attacks. 257-268

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.