TobiasLee / XDU-GradeInquiry
Python爬虫登陆教务系统查询成绩,附带均分计算和 GPA 计算,可自定义过滤科目
☆13Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for XDU-GradeInquiry
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆27Updated 7 months ago
- CCF推荐期刊/会议的历年论文数据库。☆90Updated 2 years ago
- This repository is for the paper of ICSE 2023: Regression Fuzzing for Deep Learning Systems☆12Updated 8 months ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆53Updated last month
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆30Updated this week
- ☆14Updated last year
- ☆13Updated 2 months ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆50Updated 8 months ago
- This is the source code for HufuNet. Our paper is accepted by the IEEE TDSC.☆19Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Updated 2 years ago
- Revisiting Character-level Adversarial Attacks for Language Models, ICML 2024☆9Updated 3 months ago
- ☆10Updated 2 months ago
- A collection of security papers on top-tier publications☆35Updated 3 weeks ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆58Updated 3 months ago
- ☆19Updated 2 months ago
- A curated list of malware-related papers.☆21Updated 8 months ago
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Updated last year
- Academic Papers about LLM Application on Security☆105Updated 5 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆36Updated 10 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆92Updated last year
- Recent Paper About Bug Detection☆30Updated 5 years ago
- ☆14Updated last month
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆10Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆22Updated last week
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆14Updated 6 months ago
- ☆27Updated 2 months ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆9Updated 7 months ago
- Repository for Software Security curriculum☆15Updated 4 years ago
- An NLP-based fuzzing assitance tool for generating valid option combinations.☆41Updated 7 months ago
- ☆22Updated last month