USENIX-Security-2025 / conference-formatLinks
☆20Updated last year
Alternatives and similar repositories for conference-format
Users that are interested in conference-format are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆31Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- ☆22Updated last year
- ☆114Updated 10 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆12Updated 3 weeks ago
- ☆31Updated last year
- ☆40Updated last year
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- Website for Research Artifacts from the Security Community☆18Updated this week
- ☆26Updated 8 months ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆14Updated last year
- ☆74Updated 2 years ago
- ☆31Updated last month
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆25Updated 10 months ago
- Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks☆12Updated last year
- ☆43Updated 8 months ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆14Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆29Updated last week
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆61Updated 6 months ago
- ☆15Updated last year
- Seminar 2022☆21Updated 2 months ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆27Updated 2 years ago
- ☆22Updated 9 months ago