The formai dataset: Generative ai in software security through the lens of formal verification N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis Proceedings of the 19th International Conference on Predictive Models and …, 2023 | 57 | 2023 |
CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity Knowledge N Tihanyi, MA Ferrag, R Jain, T Bisztray, M Debbah 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 2024 | 33* | 2024 |
Privacy impact assessment: comparing methodologies with a focus on practicality T Bisztray, N Gruschka Nordic Conference on Secure IT Systems, 3-19, 2019 | 28 | 2019 |
LLMs in Web Development: Evaluating LLM-Generated PHP Code Unveiling Vulnerabilities and Limitations R Tóth, T Bisztray, L Erdődi Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops: DECSoS …, 2024 | 11 | 2024 |
How secure is AI-generated code: a large-scale comparison of large language models N Tihanyi, T Bisztray, MA Ferrag, R Jain, LC Cordeiro Empirical Software Engineering 30 (2), 1-42, 2025 | 10* | 2025 |
The evolution of free-space quantum key distribution T Bisztray, L Bacsardi Infocommunications Journal 10 (1), 22-30, 2018 | 9 | 2018 |
Emerging biometric modalities and their use: Loopholes in the terminology of the GDPR and resulting privacy risks T Bisztray, N Gruschka, T Bourlai, L Fritsch 2021 International Conference of the Biometrics Special Interest Group …, 2021 | 7 | 2021 |
Data Protection Impact Assessment in Identity Control Management with a Focus on Biometrics T Bisztray, N Gruschka, V Mavroeidis, L Fritsch Open Identity Summit 2020, 185-192, 2020 | 4 | 2020 |
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence N Tihanyi, T Bisztray, RA Dubniczky, R Toth, B Borsos, B Cherif, ... 2024 IEEE International Conference on Big Data, 2024 | 3 | 2024 |
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext N Tihanyi, T Bisztray, B Borsos, S Raveau IEEE Transactions on Information Forensics and Security, 2024 | 3 | 2024 |
FormAI Dataset: A Large Collection of AI-Generated C Programs and Their Vulnerability Classifications N Tihanyi, T Bisztray, R Jain, MA Ferrag, LC Cordeiro, V Mavroeidis IEEE Dataport, 2023 | 3 | 2023 |
The Suboptimal QLV Ratio May Indicate the Need for a Left Bundle Branch Area Pacing-Optimized Cardiac Resynchronization Therapy Upgrade P Ezer, K Szűcs, R Lukács, T Bisztray, G Vilmányi, I Szokodi, A Komócsi, ... Journal of Clinical Medicine 13 (19), 5742, 2024 | 1 | 2024 |
Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities MA Ferrag, F Alwahedi, A Battah, B Cherif, A Mechri, N Tihanyi, T Bisztray, ... Internet of Things and Cyber-Physical Systems, 2025 | | 2025 |