Universal Robustness Evaluation Toolkit (for Evasion)
☆31Sep 17, 2025Updated 7 months ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 4, 2021Updated 5 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated 2 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆32Apr 15, 2025Updated last year
- TabularBench: Adversarial robustness benchmark for tabular data☆21Apr 25, 2026Updated last week
- ☆36Sep 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆20Feb 11, 2024Updated 2 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 3 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Professional Wargaming LLM Toolbox☆25Jul 9, 2025Updated 9 months ago
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆40Sep 17, 2025Updated 7 months ago
- ☆14Feb 5, 2024Updated 2 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆40Jul 25, 2021Updated 4 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Aug 8, 2019Updated 6 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆11Mar 3, 2019Updated 7 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆12Nov 12, 2021Updated 4 years ago
- Circuit Synthesis for Yao's Garbled Circuit by TinyGarble☆11Sep 25, 2020Updated 5 years ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆40Jul 29, 2018Updated 7 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Sample Excel add-in and Python script code to run an agent using LLM from an Excel function☆20Jul 16, 2024Updated last year
- Python package for ML developers and researchers to change certain variables while their code is executing to make the task of training a…☆11Apr 25, 2024Updated 2 years ago
- ☆18Mar 30, 2025Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- ☆15Mar 9, 2025Updated last year
- ☆16Aug 31, 2021Updated 4 years ago
- ☆13Sep 28, 2024Updated last year
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆13Sep 20, 2023Updated 2 years ago
- ☆13Dec 22, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆14Jun 22, 2023Updated 2 years ago
- ☆21Jul 25, 2024Updated last year
- https://arxiv.org/abs/2412.02776☆69Dec 5, 2024Updated last year
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- Code and data for the ACM CIKM 2024 paper "Adversarial Text Rewriting for Text-aware Recommender Systems"☆12Aug 1, 2024Updated last year
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year