ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2504.17198
  4. Cited By
Automatically Generating Rules of Malicious Software Packages via Large Language Model

Automatically Generating Rules of Malicious Software Packages via Large Language Model

24 April 2025
XiangRui Zhang
HaoYu Chen
YongZhong He
Wenjia Niu
Qiang Li
ArXiv (abs)PDFHTML

Papers citing "Automatically Generating Rules of Malicious Software Packages via Large Language Model"

12 / 12 papers shown
Title
Benchmark Data Contamination of Large Language Models: A Survey
Benchmark Data Contamination of Large Language Models: A Survey
Cheng Xu
Shuhao Guan
Derek Greene
Mohand-Tahar Kechadi
ELMALM
87
56
0
06 Jun 2024
Detecting Pretraining Data from Large Language Models
Detecting Pretraining Data from Large Language Models
Weijia Shi
Anirudh Ajith
Mengzhou Xia
Yangsibo Huang
Daogao Liu
Terra Blevins
Danqi Chen
Luke Zettlemoyer
MIALM
105
201
0
25 Oct 2023
Large Language Models Can Self-Improve
Large Language Models Can Self-Improve
Jiaxin Huang
S. Gu
Le Hou
Yuexin Wu
Xuezhi Wang
Hongkun Yu
Jiawei Han
ReLMAI4MHLRM
209
616
0
20 Oct 2022
Towards the Detection of Malicious Java Packages
Towards the Detection of Malicious Java Packages
Piergiorgio Ladisa
H. Plate
Matias Martinez
Olivier Barais
Serena Elisa Ponta
65
15
0
08 Oct 2022
ReAct: Synergizing Reasoning and Acting in Language Models
ReAct: Synergizing Reasoning and Acting in Language Models
Shunyu Yao
Jeffrey Zhao
Dian Yu
Nan Du
Izhak Shafran
Karthik Narasimhan
Yuan Cao
LLMAGReLMLRM
457
2,982
0
06 Oct 2022
Chain-of-Thought Prompting Elicits Reasoning in Large Language Models
Chain-of-Thought Prompting Elicits Reasoning in Large Language Models
Jason W. Wei
Xuezhi Wang
Dale Schuurmans
Maarten Bosma
Brian Ichter
F. Xia
Ed H. Chi
Quoc Le
Denny Zhou
LM&RoLRMAI4CEReLM
859
9,714
0
28 Jan 2022
What are Weak Links in the npm Supply Chain?
What are Weak Links in the npm Supply Chain?
Nusrat Zahan
Thomas Zimmermann
Patrice Godefroid
Brendan Murphy
C. Maddila
Laurie A. Williams
93
110
0
19 Dec 2021
Evaluating Large Language Models Trained on Code
Evaluating Large Language Models Trained on Code
Mark Chen
Jerry Tworek
Heewoo Jun
Qiming Yuan
Henrique Pondé
...
Bob McGrew
Dario Amodei
Sam McCandlish
Ilya Sutskever
Wojciech Zaremba
ELMALM
240
5,675
0
07 Jul 2021
Backstabber's Knife Collection: A Review of Open Source Software Supply
  Chain Attacks
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
Marc Ohm
H. Plate
Arnold Sykosch
M. Meier
69
206
0
19 May 2020
CodeBERT: A Pre-Trained Model for Programming and Natural Languages
CodeBERT: A Pre-Trained Model for Programming and Natural Languages
Zhangyin Feng
Daya Guo
Duyu Tang
Nan Duan
Xiaocheng Feng
...
Linjun Shou
Bing Qin
Ting Liu
Daxin Jiang
Ming Zhou
185
2,692
0
19 Feb 2020
Small World with High Risks: A Study of Security Threats in the npm
  Ecosystem
Small World with High Risks: A Study of Security Threats in the npm Ecosystem
Markus Zimmermann
Cristian-Alexandru Staicu
Cam Tenny
Michael Pradel
98
232
0
25 Feb 2019
Beyond Metadata: Code-centric and Usage-based Analysis of Known
  Vulnerabilities in Open-source Software
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
Serena Elisa Ponta
H. Plate
A. Sabetta
42
77
0
15 Jun 2018
1