Android malware classification using both .java files and .so files
☆11Jan 19, 2019Updated 7 years ago
Alternatives and similar repositories for Android-Malware-Detection
Users that are interested in Android-Malware-Detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android malware detection using static and dynamic analysis☆40Apr 16, 2019Updated 6 years ago
- ☆59Mar 11, 2018Updated 8 years ago
- Cybersecurity Data Mining Competition 2016☆11Jan 19, 2019Updated 7 years ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- Effectiveness of additional training of an ANN based model in detectining android malware☆16Aug 7, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CNN based android malware detection system☆22Aug 12, 2019Updated 6 years ago
- Android Malware Detection using Deep Learning☆53Aug 21, 2019Updated 6 years ago
- A machine learning based Android malware detection model.☆14Apr 13, 2017Updated 9 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Nov 6, 2018Updated 7 years ago
- In recent time there has been an increase of malicious Android applications showing up on both official and unofficial markets. If one ha…☆14Mar 28, 2014Updated 12 years ago
- Android Malware detection using Deep Learning Hybrid Model.☆24Mar 28, 2018Updated 8 years ago
- Malware detection project on Android devices using machine learning classification algorithms.☆78Jun 13, 2017Updated 8 years ago
- [ICML-2025] Official Pytorch implementation of "Perceptual-GS: Scene-adaptive Perceptual Densification for Gaussian Splatting"☆25Mar 31, 2026Updated 2 weeks ago
- 100xDraw is a real-time collaborative whiteboard tool built with WebSockets. It enables users to draw, collaborate, and share their white…☆12Feb 22, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Detection of Android Malware based on system calls using Support Vector Machines.☆12Nov 27, 2020Updated 5 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- SAP: Open UI5 CRUD Example with ABAP dictionary based OData service☆26Mar 9, 2019Updated 7 years ago
- ☆13Apr 1, 2025Updated last year
- Optimized, immutable Java implementations of fixed-width, unsigned integers.☆32Jan 15, 2023Updated 3 years ago
- Ocean sensor data from the NOAA CO-OPS API☆14Jul 14, 2016Updated 9 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- ☆22Sep 5, 2025Updated 7 months ago
- [CVPR 2025] Official Pytorch implementation of "Learning with Noisy Triplet Correspondence for Composed Image Retrieval".☆24Jun 9, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Chat Message La - A Blockchain implementation for ultra-secure (just kidding!) messaging in Java☆19Nov 11, 2018Updated 7 years ago
- 使用biaffine的中文命名实体识别☆10Jan 12, 2023Updated 3 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- Research Artifact for HPCA'24 Paper: *Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities*.☆11Oct 30, 2025Updated 5 months ago
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- This is an official implementation of our CVPR 2020 paper "Non-Local Neural Networks With Grouped Bilinear Attentional Transforms".☆12Jan 30, 2021Updated 5 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- [ICML'25] Breaking Silos: Adaptive Model Fusion Unlocks Better Time Series Forecasting | 样本级别的自适应多模型集成时间序列预测☆27May 22, 2025Updated 10 months ago
- Implementation of Modbus protocol for a data logger project back that I worked back in my 3rd year of college. This is a low overhead wir…☆14Jan 26, 2012Updated 14 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is implementation of deep convolutional generative adversarial network in TensorFlow library and I will use it to generate videos.☆10Apr 26, 2017Updated 8 years ago
- SecureBinder 是一款跨平台二进制文件捆绑与加壳工具,支持将两个 .exe / .elf / .apk 文件合并为一个自解压自执行的单文件。工具内置 RC4 加密、zlib 压缩、PyInstaller 打包、UPX 二次压缩与沙箱检测机制,适用于软件封装、双程序…☆14Jun 29, 2025Updated 9 months ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- [ACM MM 2024] Pytorch Code for the paper "Robust Variational Contrastive Learning for Partially View-unaligned Clustering"☆15Feb 7, 2026Updated 2 months ago
- collection of pyTorch network structure☆11May 29, 2019Updated 6 years ago
- ☆22Jan 15, 2025Updated last year
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago