[TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps
☆15Jun 8, 2022Updated 3 years ago
Alternatives and similar repositories for SmartAppAttack
Users that are interested in SmartAppAttack are comparing it to the libraries listed below
Sorting:
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 9 months ago
- Code for our paper "Modelobfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems" that has been published by ISSTA…☆19May 18, 2024Updated last year
- ☆20Mar 6, 2023Updated 2 years ago
- ☆25Nov 8, 2023Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- ☆25Oct 2, 2024Updated last year
- ☆12Nov 30, 2018Updated 7 years ago
- An Empirical Study of AI Techniques in Mobile Applications☆12May 28, 2024Updated last year
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆37Aug 17, 2023Updated 2 years ago
- Detecting and analyzing deep learning usage on smartphone apps☆32Jan 22, 2024Updated 2 years ago
- Implementations of Influential Recommender System☆11Oct 29, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning☆40Jan 4, 2023Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- Python implementation for the project titled "Optimization problems in vehicle route network design" developed at IIIT Delhi as part of m…☆13Dec 8, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- ☆21Feb 10, 2026Updated 2 weeks ago
- ☆11Mar 24, 2023Updated 2 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- ☆10Dec 25, 2019Updated 6 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Implementation of Contrastive Predictive Coding for Natural Language☆10Sep 16, 2020Updated 5 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- [NeurIPS 2024] Efficiency for Free: Ideal Data Are Transportable Representations☆19Jan 19, 2025Updated last year
- This repository contains the replication package of our paper "Assessing the Security of GitHub Copilot’s Generated Code - A Targeted Rep…☆10Nov 16, 2023Updated 2 years ago
- ☆12Nov 26, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- ☆10Sep 25, 2019Updated 6 years ago
- ☆10Dec 26, 2023Updated 2 years ago