TensorFlow API analysis tool and malicious model detection tool
☆39May 27, 2025Updated 9 months ago
Alternatives and similar repositories for TensorAbuse
Users that are interested in TensorAbuse are comparing it to the libraries listed below
Sorting:
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆96Jan 20, 2025Updated last year
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆19Aug 4, 2024Updated last year
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Kernel isolation tester.☆18Oct 20, 2022Updated 3 years ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 9 months ago
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆14Jun 10, 2025Updated 8 months ago
- ☆16Apr 7, 2023Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- [ICSE 2025] The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries (AC…☆20Dec 22, 2025Updated 2 months ago
- Turn Tree into Graph: Automatic Code Review via Simplified AST Driven Graph Convolutional Network☆15Apr 5, 2022Updated 3 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- ☆43Sep 18, 2020Updated 5 years ago
- Code release for RobOT (ICSE'21)☆15Dec 5, 2022Updated 3 years ago
- ☆30Updated this week
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- [EMNLP'22] Code for 'Exploring Representation-level Augmentation for Code Search'☆27Oct 9, 2023Updated 2 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆21Mar 7, 2025Updated 11 months ago
- ☆52Nov 19, 2022Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- ☆23Apr 7, 2022Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆67Mar 25, 2025Updated 11 months ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆27Dec 5, 2023Updated 2 years ago
- Fuzzing Automatic Differentiation in Deep-Learning Libraries (ICSE'23)☆27Mar 2, 2024Updated 2 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- ☆26Jul 19, 2022Updated 3 years ago
- GAINS: Getting stArted wIth biNary analysiS☆31Feb 23, 2022Updated 4 years ago
- ☆30Apr 2, 2023Updated 2 years ago
- A manually vetted dataset for security vulnerability detection in Java projects☆92Aug 12, 2025Updated 6 months ago
- ☆26Dec 17, 2021Updated 4 years ago
- ☆29Dec 16, 2022Updated 3 years ago
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago
- Framework for building reliable LLM agents with structured specs, operator-level verification, and progressive solidification.☆61Updated this week
- AI安全☆35Dec 28, 2020Updated 5 years ago
- A Dataflow-Driven and Automated Fuzzer for the PHP Interpreter☆47Jun 19, 2025Updated 8 months ago
- ☆40Jan 5, 2026Updated last month