USENIX-Security-2025 / conference-formatLinks
☆22Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆206Updated last month
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆128Updated 7 months ago
- ☆32Updated 2 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- ☆26Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆781Updated last week
- ☆124Updated last year
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆81Updated 3 years ago
- ☆35Updated this week
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 6 months ago
- Differential Privacy Testing System☆22Updated 5 years ago
- ☆76Updated 2 years ago
- CodeGuard+: Constrained Decoding for Secure Code Generation☆17Updated last year
- A collection of security papers on top-tier publications☆59Updated this week
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Updated last year
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- AUSERA: Automated Security Vulnerability Detection for Android Apps☆32Updated last year
- A System for Debloating C/C++ Programs☆31Updated 4 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆26Updated 8 months ago
- ☆31Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆62Updated 7 months ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆29Updated last year
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆76Updated 4 months ago
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆25Updated 4 years ago