☆16Jun 22, 2022Updated 3 years ago
Alternatives and similar repositories for HAWK
Users that are interested in HAWK are comparing it to the libraries listed below
Sorting:
- ☆13Jan 30, 2022Updated 4 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- ☆14Apr 10, 2024Updated last year
- ☆12Sep 29, 2019Updated 6 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Sep 25, 2023Updated 2 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 2 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Aug 2, 2021Updated 4 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- A simple cross-platform script for encoding any binary file into a lossless PNG.☆17Aug 12, 2024Updated last year
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 11 months ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- ☆11May 3, 2019Updated 6 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Few shot text classification with Prototypical networks☆23Oct 18, 2019Updated 6 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- ☆12Jul 8, 2022Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆52Jul 4, 2019Updated 6 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆59Mar 11, 2018Updated 8 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆11Jun 27, 2020Updated 5 years ago
- PHP ASP 一句话木马,过狗一句话,附带PHP ASP 扫描器,扫描本地文件可疑代码☆10Aug 6, 2019Updated 6 years ago
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆12Dec 17, 2024Updated last year
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- ☆10Mar 11, 2023Updated 3 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- A toy implementation about Program Dependence Graph using LLVM☆13Sep 27, 2023Updated 2 years ago
- A fully and partially fake speech dataset for evaluation☆14Nov 11, 2025Updated 4 months ago
- ☆43Aug 6, 2021Updated 4 years ago
- 江苏大学硕士学位论文Latex模板☆22May 9, 2025Updated 10 months ago
- "Learning Stable Classifiers by Transferring Unstable Features" ICML 2022☆14Jul 24, 2022Updated 3 years ago
- Can Graph Neural Networks Go "Online"? An Analysis of Pretraining and Inference☆19Sep 8, 2019Updated 6 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- ☆11May 10, 2018Updated 7 years ago
- A Retrieval-Augmented Generation (RAG) system running DeepSeek R1 Distill LLama 70B model using Groq's fast inference API.☆13Jan 29, 2025Updated last year