Ferhat94 / Random-Transformer-Forest
☆13Updated 3 years ago
Alternatives and similar repositories for Random-Transformer-Forest:
Users that are interested in Random-Transformer-Forest are comparing it to the libraries listed below
- Datawhale&科大讯飞2021A.I.开发者大赛恶意软件分类CV/NLP/表格三个方向的建模思路+伪标签LGB(rank11)☆11Updated 3 years ago
- ☆27Updated 4 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- ☆34Updated 5 months ago
- ☆10Updated 2 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆132Updated last year
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆105Updated 6 months ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆17Updated 3 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆63Updated last year
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆24Updated 11 months ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆36Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- ☆55Updated 5 years ago
- 基于卷积神经网络的恶意软件检测方法☆49Updated 5 years ago
- ☆28Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 8 months ago
- This repository is the PyTorch implementation of GAN Ensemble for Anomaly Detection.☆39Updated 3 years ago
- ☆21Updated 3 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆12Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆17Updated 4 years ago
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆29Updated last month
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆31Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 4 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- ☆15Updated 3 years ago
- ☆16Updated 2 years ago
- ☆17Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- A large-scale database for graph representation learning☆49Updated 2 years ago