1 code implementation • 1 Oct 2022 • Yash Jakhotiya, Heramb Patil, Jugal Rawlani, Dr. Sunil B. Mane
Signature-based malware detectors have proven to be insufficient as even a small change in malignant executable code can bypass these signature-based detectors.
no code implementations • 5 Sep 2022 • Yash Jakhotiya, Iman Haque
Our baseline implementation meets or exceeds the baseline of the original work, however, we found that our explorations into the new methods was not as effective as we anticipated.
1 code implementation • SemEval (NAACL) 2022 • Yash Jakhotiya, Vaibhav Kumar, Ashwin Pathak, Raj Shah
In this paper, we train multiple Large Language Models in both the settings and achieve an F1 score (macro) of 0. 73 for the zero shot setting and an F1 score (macro) of 0. 85 for the one shot setting.