Ian-Jhon / GZHU_Thesis_Latex_Template
广州大学学位论文模板
☆21Updated 2 weeks ago
Alternatives and similar repositories for GZHU_Thesis_Latex_Template
Users that are interested in GZHU_Thesis_Latex_Template are comparing it to the libraries listed below
Sorting:
- 广州大学方班课程&学习资源共享计划☆70Updated 3 years ago
- ☆44Updated last year
- ☆13Updated 3 years ago
- ☆66Updated 2 months ago
- ☆108Updated 2 years ago
- Academic Papers about LLM Application on Security☆134Updated 3 months ago
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆58Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆32Updated 8 months ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆86Updated 2 years ago
- ☆19Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆101Updated 6 months ago
- ☆82Updated last year
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- ☆11Updated 2 years ago
- ☆11Updated last year
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆64Updated last year
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆30Updated last month
- A curated list of malware-related papers.☆28Updated last year
- This repo list the core literature in the field of fuzzing test, large language model, and LLM-based fuzzer. Most of papers are selected …☆52Updated last year
- ☆18Updated 4 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆13Updated 7 months ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆20Updated last year
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Updated last year
- To store some files that I prepared for recommended postgraduate.☆15Updated 5 years ago
- ☆25Updated 2 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆13Updated 3 years ago
- ☆46Updated 6 years ago
- ☆12Updated 4 months ago
- VulDeePecker algorithm implemented in Python☆114Updated 6 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago