Jinxhy / SmartAppAttackLinks
[TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps
☆15Updated 3 years ago
Alternatives and similar repositories for SmartAppAttack
Users that are interested in SmartAppAttack are comparing it to the libraries listed below
Sorting:
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated this week
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆33Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆14Updated 2 months ago
- ☆16Updated 11 months ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆51Updated 7 years ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- ☆19Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆35Updated 2 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- ☆25Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- ☆10Updated 9 months ago
- ☆24Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- ☆27Updated 5 years ago
- ☆66Updated 4 years ago
- ☆120Updated last year
- ☆18Updated 4 years ago
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆38Updated 7 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- ☆9Updated 2 years ago
- ☆15Updated 2 years ago
- ☆146Updated 10 months ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆47Updated 2 years ago