UCI-Networking-Group / PoliGraph
PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
☆26Updated last year
Alternatives and similar repositories for PoliGraph:
Users that are interested in PoliGraph are comparing it to the libraries listed below
- NLP dataset: Chinese Android Privacy Policy Dataset☆22Updated last month
- This repository holds the code for PolicyLint and PoliCheck, which identifies internal contradictions within privacy policies and analyze…☆58Updated 2 years ago
- Source code of PurPliance analysis tool.☆17Updated last year
- Reproducing state-of-the-art results☆22Updated 2 years ago
- Seminar 2022☆21Updated last month
- Academic Papers about LLM Application on Security☆134Updated 2 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆13Updated 6 months ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆29Updated 2 months ago
- ☆22Updated 6 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆66Updated 3 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆140Updated 2 months ago
- ☆20Updated 8 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆39Updated 3 years ago
- ☆220Updated 11 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆16Updated 7 months ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆13Updated 2 years ago
- ☆111Updated 9 months ago
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆19Updated last month
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆112Updated this week
- The automated prompt injection framework for LLM-integrated applications.☆198Updated 7 months ago
- ☆79Updated last year
- 华中科技大学网络安全课程设计-Linux下的状态检测防火墙☆11Updated 2 years ago
- ☆9Updated 3 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆26Updated 8 months ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- ☆13Updated 2 months ago
- A curated list of malware-related papers.☆27Updated last year
- ☆12Updated last year
- ☆20Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆33Updated 5 months ago