RICC: Robust Collective Classification of Sybil Accounts
☆11Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for RICC
Users that are interested in RICC are comparing it to the libraries listed below
Sorting:
- Link: Black-Box Detection of Cross-Site Scripting Vulnerabilities Using Reinforcement Learning☆25Apr 28, 2022Updated 3 years ago
- An investigative study on the security and privacy aspects of Progressive Web Apps☆19Oct 14, 2018Updated 7 years ago
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆15Feb 27, 2023Updated 3 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- Some research on UXSS vulnerabilities in web browsers☆12May 14, 2018Updated 7 years ago
- Git-based CTF☆63Dec 5, 2018Updated 7 years ago
- Credit by ADLab of Venustech☆11Dec 9, 2021Updated 4 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- A penetration testing tool for finding file upload bugs (NDSS 2020)☆253Mar 30, 2021Updated 4 years ago
- ☆17Mar 17, 2022Updated 4 years ago
- ☆12Feb 14, 2024Updated 2 years ago
- Grey-box Concolic Testing on Binary Code (ICSE '19)☆156Oct 4, 2021Updated 4 years ago
- Anonymous voting☆18Aug 23, 2022Updated 3 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- B2R2 is a collection of useful algorithms, functions, and tools for binary analysis.☆446Mar 11, 2026Updated last week
- ☆20Oct 2, 2020Updated 5 years ago
- ☆24Jun 19, 2023Updated 2 years ago
- Ethernaut Solidity Game Solution - DEX Attack - Flash Loan Attack☆18Dec 6, 2021Updated 4 years ago
- ☆25Jun 21, 2022Updated 3 years ago
- A static-analysis tool to detect C/C++ vulnerabilities based on graph comparison☆29Feb 26, 2021Updated 5 years ago
- [ICML2023] Instant Soup Cheap Pruning Ensembles in A Single Pass Can Draw Lottery Tickets from Large Models. Ajay Jaiswal, Shiwei Liu, Ti…☆11Nov 28, 2023Updated 2 years ago
- A framework to detect attacks and trace stolen assets across Ethereum (FC 2021).☆32Jul 17, 2025Updated 8 months ago
- Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference (ICSE '20)☆54Sep 21, 2020Updated 5 years ago
- Open-Source AI-powered web browser. Browse the web with your own LLM API key. Alternative to Dia / Comet.☆91Jul 21, 2025Updated 8 months ago
- Node.js module for the CLIP model.☆15Sep 16, 2024Updated last year
- CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines (NDSS '19)☆242Nov 11, 2019Updated 6 years ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆35Sep 14, 2020Updated 5 years ago
- ☆55Oct 15, 2018Updated 7 years ago
- Teaching a humanoid to walk(ish), then displaying in your browser (using tensorflow.js and reinforcement learning)☆10Sep 7, 2020Updated 5 years ago
- The PyTorch implementation for "BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection"☆58Sep 18, 2025Updated 6 months ago
- ☆46Jul 29, 2021Updated 4 years ago
- (NDSS 2024) Optimizing Decompiler Output with LLM☆129Sep 8, 2024Updated last year
- paper on dexpilot☆15Oct 14, 2019Updated 6 years ago
- LLM Skirmish☆44Feb 3, 2026Updated last month
- A starter template for AWS Elastic Beanstalk worker project☆14Mar 27, 2019Updated 6 years ago
- ☆16Feb 22, 2025Updated last year
- Data driven access control layer for mongoose.☆11Apr 11, 2017Updated 8 years ago
- DreamSmooth: Improving Model-Based RL with Reward Smoothing (ICLR 2024)☆12May 6, 2024Updated last year
- The code for the paper "A Bayesian Approach to Online Planning" published in ICML 2024.☆13Jun 17, 2024Updated last year