The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025
☆24May 21, 2025Updated 9 months ago
Alternatives and similar repositories for CSEBenchmark
Users that are interested in CSEBenchmark are comparing it to the libraries listed below
Sorting:
- CarpetFuzz's fuzzer component. Belongs to CarpetFuzz main repo.☆15Jun 29, 2024Updated last year
- ☆18Mar 15, 2024Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆99Feb 10, 2026Updated 2 weeks ago
- Pytorch implementation of Tree Preference Optimization (TPO) (Accepted by ICLR'25)☆26Apr 24, 2025Updated 10 months ago
- [Oakland 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆27Apr 15, 2025Updated 10 months ago
- A music composer and player with MATLAB☆11Mar 14, 2020Updated 5 years ago
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆39May 6, 2024Updated last year
- The Oyster series is a set of safety models developed in-house by Alibaba-AAIG, devoted to building a responsible AI ecosystem. | Oyster …☆59Sep 11, 2025Updated 5 months ago
- Robust PCA: PCP, Stable PCP, PCP with compressed data, IRCUR☆12Dec 19, 2021Updated 4 years ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- The official PyTorch implementation of the Iterated Integrated Attributions (IIA) method.☆10Jan 23, 2024Updated 2 years ago
- AI Model Security Reading Notes☆41Mar 14, 2025Updated 11 months ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆16Jul 9, 2025Updated 7 months ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- ☆12Jun 10, 2025Updated 8 months ago
- ☆16Feb 23, 2025Updated last year
- bert蒸馏实践,包含BiLSTM蒸馏BERT和TinyBert