XZ-X / PEMLinks
☆15Updated last year
Alternatives and similar repositories for PEM
Users that are interested in PEM are comparing it to the libraries listed below
Sorting:
- Seminar 2022☆21Updated 2 months ago
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 9 months ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- ☆17Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆24Updated last year
- ☆124Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- ☆21Updated last year
- ☆105Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Updated last year
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- ☆26Updated last year
- ☆11Updated last year
- Code for the paper "A Lightweight Framework for Function Name Reassignment Based on Large-Scale Stripped Binaries"☆15Updated 4 years ago
- ☆31Updated last year
- Lifting network implementation to precise format specification☆23Updated 7 months ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆38Updated 3 years ago
- CovRL-Fuzz: Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation☆39Updated last year
- ☆15Updated 2 years ago
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- CONCOCTION is an automated machine learning-based vulnerability detection framework that combines static source code information and dyna…☆29Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- patch presence test via symbolic signatures, ICSE'24☆12Updated last year
- Binary Code Summarization☆13Updated 8 months ago
- ☆32Updated 2 years ago
- This is the official repository for VulHawk.☆74Updated 2 years ago
- Artifacts for our USENIX Security '24 paper: "Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation f…☆80Updated last year
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Updated 3 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago