Jieerbobo / TrustGuard
Source code of paper "TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support"
☆15Updated last week
Related projects: ⓘ
- ☆14Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆31Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆75Updated last year
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆49Updated 7 months ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆52Updated last year
- ☆53Updated last year
- ☆15Updated 8 months ago
- Datasets used in the StreamSpot experiments☆48Updated 8 years ago
- the instructions about request access to AdvDroidZero☆10Updated 5 months ago
- ☆18Updated 3 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago
- ☆14Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆25Updated last year
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆38Updated 2 years ago
- This repository is for reviewers to check the code of KDD2021 Dr.Droid☆16Updated 3 years ago
- This is source code for ELISE☆9Updated 3 years ago
- Usenix Security'23☆13Updated last year
- ☆30Updated 4 months ago
- A curated list of malware-related papers.☆21Updated 6 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆12Updated 4 years ago
- ☆24Updated 2 years ago
- A PyTorch implementation of of E-GraphSAGE.☆68Updated 2 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆18Updated 3 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆75Updated last year
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆42Updated 11 months ago
- The scalable bug search for binaries☆66Updated 7 years ago
- ☆14Updated 9 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆64Updated 3 months ago
- A PyTorch implementation of of Anomal-E.☆30Updated last year