XZ-X / PEMLinks
☆15Updated last year
Alternatives and similar repositories for PEM
Users that are interested in PEM are comparing it to the libraries listed below
Sorting:
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 7 months ago
- Seminar 2022☆21Updated 3 weeks ago
- ☆17Updated last year
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Updated last year
- ☆25Updated last year
- ☆123Updated last year
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆25Updated last year
- ☆11Updated last year
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- ☆31Updated last year
- Lifting network implementation to precise format specification☆24Updated 6 months ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- ☆103Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆21Updated last year
- This is the official repository for VulHawk.☆72Updated 2 years ago
- Binary Code Summarization☆11Updated 6 months ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆76Updated 10 months ago
- ☆82Updated last week
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- ☆32Updated 2 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆12Updated 3 years ago
- Code for tracelet-level symbolic execution☆18Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆37Updated 3 years ago
- ☆14Updated 2 years ago