Noah Fleischmann
YOU?
Author Swipe
View article: Is Function Similarity Over-Engineered? Building a Benchmark
Is Function Similarity Over-Engineered? Building a Benchmark Open
Binary analysis is a core component of many critical security tasks, including reverse engineering, malware analysis, and vulnerability detection. Manual analysis is often time-consuming, but identifying commonly-used or previously-seen fu…
View article: Establishing baselines and introducing TernaryMixOE for fine-grained out-of-distribution detection
Establishing baselines and introducing TernaryMixOE for fine-grained out-of-distribution detection Open
Machine learning models deployed in the open world may encounter observations that they were not trained to recognize, and they risk misclassifying such observations with high confidence. Therefore, it is essential that these models are ab…