icml24
☆14Feb 24, 2025Updated last year
Alternatives and similar repositories for GroupCover
Users that are interested in GroupCover are comparing it to the libraries listed below
Sorting:
- ☆10Dec 26, 2023Updated 2 years ago
- ☆46Feb 13, 2026Updated 2 weeks ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Apr 11, 2024Updated last year
- ☆15Jan 5, 2024Updated 2 years ago
- ☆29Oct 27, 2023Updated 2 years ago
- Open-source code and data for ShadowNet(S&P Oakland'23)☆11Mar 11, 2024Updated last year
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- ☆14Aug 17, 2024Updated last year
- Tests for verifying compliance of RMM implementations☆21Sep 22, 2025Updated 5 months ago
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆34Jan 1, 2021Updated 5 years ago
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 5 years ago
- ☆22Aug 23, 2022Updated 3 years ago
- 🚂 基于 Python FastAPI + Vue 3 + Electron 开发的 12306 自动化抢票助手。支持自动登录、余票监控、订单提交及桌面化集成,提供直观的 GUI 管理界面。仅供学习交流使用。☆14Jan 21, 2026Updated last month
- TypeForge: Synthesizing and Selecting Best-Fit Composite Data Types for Stripped Binaries (S&P 2025)☆45Jan 5, 2026Updated last month
- ☆11Dec 23, 2024Updated last year
- ☆22Jul 16, 2022Updated 3 years ago
- Enhancing Domain Adaptation through Prompt Gradient Alignment (NeurIPS 2024)☆14Jun 16, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Matrix multiplication on the NPU inside RK3588☆17Jun 27, 2024Updated last year
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- ☆12Mar 26, 2024Updated last year
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- The implementation of our IEEE S&P 2024 paper "Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples".☆11Jun 28, 2024Updated last year
- ☆20Updated this week
- ☆11Dec 11, 2024Updated last year
- ☆11Mar 24, 2023Updated 2 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago