Jinxhy / SmartAppAttackLinks
[TIFS'22]Smart App Attack: Hacking Deep Learning Models in Android Apps
☆15Updated 2 years ago
Alternatives and similar repositories for SmartAppAttack
Users that are interested in SmartAppAttack are comparing it to the libraries listed below
Sorting:
- ☆19Updated last year
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- ☆16Updated 9 months ago
- ☆13Updated last year
- ☆11Updated 7 months ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- ☆66Updated 4 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆12Updated 2 weeks ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆8Updated 2 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆31Updated 3 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆33Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 5 years ago
- ☆24Updated 2 years ago
- ☆42Updated 10 months ago
- ☆15Updated 2 years ago
- ☆85Updated last year
- CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot☆11Updated last year
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆71Updated last year
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆18Updated 4 years ago
- ☆43Updated 8 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated 2 months ago
- ☆26Updated 8 months ago
- Code Snippet Recommendation from Stack Overflow Post☆18Updated 3 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆26Updated 9 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆29Updated this week
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆14Updated 3 years ago