Android malware classification using both .java files and .so files
☆11Jan 19, 2019Updated 7 years ago
Alternatives and similar repositories for Android-Malware-Detection
Users that are interested in Android-Malware-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware detection using static and dynamic analysis☆39Apr 16, 2019Updated 6 years ago
- ☆59Mar 11, 2018Updated 8 years ago
- Cybersecurity Data Mining Competition 2016☆11Jan 19, 2019Updated 7 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- CNN based android malware detection system☆22Aug 12, 2019Updated 6 years ago
- Android Malware Detection using Deep Learning☆53Aug 21, 2019Updated 6 years ago
- A machine learning based Android malware detection model.☆14Apr 13, 2017Updated 8 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- In recent time there has been an increase of malicious Android applications showing up on both official and unofficial markets. If one ha…☆14Mar 28, 2014Updated 11 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 7 years ago
- Malware detection project on Android devices using machine learning classification algorithms.☆78Jun 13, 2017Updated 8 years ago
- [ICML-2025] Official Pytorch implementation of "Perceptual-GS: Scene-adaptive Perceptual Densification for Gaussian Splatting"☆24Jul 8, 2025Updated 8 months ago
- 100xDraw is a real-time collaborative whiteboard tool built with WebSockets. It enables users to draw, collaborate, and share their white…☆12Feb 22, 2025Updated last year
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- SAP: Open UI5 CRUD Example with ABAP dictionary based OData service☆26Mar 9, 2019Updated 7 years ago
- ☆12Apr 1, 2025Updated 11 months ago
- Optimized, immutable Java implementations of fixed-width, unsigned integers.☆32Jan 15, 2023Updated 3 years ago
- Ocean sensor data from the NOAA CO-OPS API☆14Jul 14, 2016Updated 9 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- ☆22Sep 5, 2025Updated 6 months ago
- [CVPR 2025] Official Pytorch implementation of "Learning with Noisy Triplet Correspondence for Composed Image Retrieval".☆23Jun 9, 2025Updated 9 months ago
- Chat Message La - A Blockchain implementation for ultra-secure (just kidding!) messaging in Java☆19Nov 11, 2018Updated 7 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 4 months ago
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- This is an official implementation of our CVPR 2020 paper "Non-Local Neural Networks With Grouped Bilinear Attentional Transforms".☆12Jan 30, 2021Updated 5 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- [ICML'25] Breaking Silos: Adaptive Model Fusion Unlocks Better Time Series Forecasting | 样本级别的自适应多模型集成时间序列预测☆26May 22, 2025Updated 10 months ago
- Implementation of Modbus protocol for a data logger project back that I worked back in my 3rd year of college. This is a low overhead wir…☆14Jan 26, 2012Updated 14 years ago
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 8 years ago
- SecureBinder 是一款跨平台二进制文件捆绑与加壳工具,支持将两个 .exe / .elf / .apk 文件合并为一个自解压自执行的单文件。工具内置 RC4 加密、zlib 压缩、PyInstaller 打包、UPX 二次压缩与沙箱检测机制,适用于软件封装、双程序…☆12Jun 29, 2025Updated 8 months ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- [ACM MM 2024] Pytorch Code for the paper "Robust Variational Contrastive Learning for Partially View-unaligned Clustering"☆15Feb 7, 2026Updated last month
- collection of pyTorch network structure☆11May 29, 2019Updated 6 years ago
- ☆22Jan 15, 2025Updated last year
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago