Astronaut-diode / MVD-HG
基于源代码的图融合的智能合约漏洞检测
☆13Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for MVD-HG
- 基于字节码的图融合的智能合约漏洞检测☆11Updated 6 months ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆38Updated last week
- A collection of security papers on top-tier publications☆35Updated last month
- This repository contains the codes of the publication "TrafficGPT: An LLM Approach for Open-Set Encrypted Traffic Classification".☆14Updated 4 months ago
- 基于图神经网络的切片级漏洞检测及解释方法☆44Updated 3 weeks ago
- 利用强化学习方法 DQN 生成基于机器学习的恶意流量检测模型☆24Updated 3 years ago
- 这是一份包含所有目前官方已知漏洞的C语言漏洞集合,用于科研使用☆9Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆58Updated last year
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆34Updated 6 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆41Updated 2 years ago
- ☆53Updated 2 months ago
- 一个搜索网络安全领域顶会论文的小工具☆58Updated 2 weeks ago
- ☆16Updated 2 weeks ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆24Updated last month
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆49Updated last year
- Academic Papers about LLM Application on Security☆106Updated 5 months ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆19Updated 3 years ago
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆14Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆25Updated 2 months ago
- A curated list of malware-related papers.☆22Updated 8 months ago
- FL-based intrusion detection system development using model averaging.☆30Updated last year
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆142Updated last year
- ☆86Updated last year
- Flow Interaction Graph based attack traffic detection system.☆136Updated 6 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆61Updated last year
- ☆21Updated 8 months ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆35Updated 8 months ago
- ☆15Updated 2 years ago