KimHyungSub / CPS-papersLinks
☆15Updated last month
Alternatives and similar repositories for CPS-papers
Users that are interested in CPS-papers are comparing it to the libraries listed below
Sorting:
- ☆21Updated 8 months ago
- ☆12Updated 8 months ago
- Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach☆14Updated 4 years ago
- Cyber-Physical Inconsistency Identification for Safety Checks in Robotic Vehicles☆10Updated 2 years ago
- ☆20Updated 5 years ago
- ☆24Updated last year
- A state-aware defense framework against vehicular message injection attacks.☆35Updated 4 years ago
- ☆24Updated 11 months ago
- Exercises for practicing MLSec for Systems Security☆10Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆181Updated last month
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆14Updated 2 years ago
- Policy-Guided Fuzzing for Robotic Vehicles☆37Updated 2 years ago
- ☆16Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆72Updated 2 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Updated last year
- ☆41Updated last month
- ☆25Updated last month
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- ☆32Updated 2 years ago
- ☆11Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆297Updated 10 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆141Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆757Updated last week
- Surakav Implementation☆17Updated last year
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆60Updated last year
- VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-guided Simulation Testing☆14Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆14Updated 6 months ago
- Smart Contract Security Vulnerability Detection Method based on Target-guided Symbolic Execution☆13Updated 3 years ago