Malware Machine Learning
☆27Apr 1, 2018Updated 8 years ago
Alternatives and similar repositories for Malware-Machine-Learning
Users that are interested in Malware-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- Visual malware classification experiments using deep learning techniques.☆12Jan 17, 2018Updated 8 years ago
- Object detection and classification☆12Oct 19, 2018Updated 7 years ago
- Machine learning for malware detection☆11Aug 2, 2016Updated 9 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 基于恶意样本的图像化,对恶意代码进行机器学习并进行检测☆11Mar 25, 2018Updated 8 years ago
- 恶意软件检测系统后端代码☆12Nov 28, 2020Updated 5 years ago
- Master Computer Vision™ OpenCV3 in Python and Machine Learning, published by Packt☆11Jan 15, 2021Updated 5 years ago
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- CV and Deep Learning methods to analyze the data from Traffic Camera☆13Sep 29, 2018Updated 7 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Malware & URL Scanner - A Chrome extension to lookup a Potentially Malicious Websites.☆13May 27, 2021Updated 4 years ago
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 9 years ago
- anomaly detection algorithm which to predict fraudulent credit card transactions☆15May 14, 2018Updated 8 years ago
- a pytorch implement of Supervised Contrastive Learning with memory bank(queue)☆15May 25, 2022Updated 3 years ago
- Controlling Traffic Lights Using Image Processing☆13Apr 17, 2026Updated last month
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- An implementation of the Multilayer Perceptron for breast cancer detection using the Wisconsin diagnostic dataset.☆10Feb 1, 2024Updated 2 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆54Jan 28, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [TextING-pytorch] Pytorch implementation for "Every Document Owns Its Structure: Inductive Text Classification via Graph Neural Networks"☆13Feb 10, 2021Updated 5 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Free Malware Training Datasets for Machine Learning☆242Jan 3, 2021Updated 5 years ago
- The project is to recognize spoofing attack of faces using a normal flat camera without any extra sensors (such as depth, IR).☆10Jul 25, 2022Updated 3 years ago
- A Generative Adversarial Network for Shakuhachi Music☆14Jul 2, 2019Updated 6 years ago
- Hybrid Malicious Code Detection using Deep Learning with Keras and Scikit Learn☆11May 2, 2018Updated 8 years ago
- Android malware classification using both .java files and .so files☆11Jan 19, 2019Updated 7 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Unofficial chainer implementation of 'Unpaired Image-to-Image Translation using Cycle-Consistent Adversarial Networks' [Zhu+, ICCV2017]☆13Mar 19, 2018Updated 8 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Bidirectional Encoder Representations from Transformers (BERT) transfer learning for named entity recognition and de-identification of se…☆10Aug 3, 2019Updated 6 years ago
- Dataset and Code for our CVPR'18 paper ST-CGAN: "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detectio…☆13Apr 17, 2018Updated 8 years ago
- Generative Adversarial Networks in Knet☆13Jul 3, 2019Updated 6 years ago
- Replaceable Representation Learning with Generative Adversarial Networks☆11Aug 31, 2017Updated 8 years ago