alipay / ComBERT
☆12Updated last year
Alternatives and similar repositories for ComBERT:
Users that are interested in ComBERT are comparing it to the libraries listed below
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆39Updated 3 years ago
- ☆34Updated 9 months ago
- Android third-party library Detection☆16Updated 5 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆25Updated 3 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆30Updated 3 years ago
- NLP dataset: Chinese Android Privacy Policy Dataset☆22Updated last month
- Reproducing state-of-the-art results☆22Updated 2 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated last month
- Project FlowCog (2017)☆27Updated 6 years ago
- ☆29Updated 7 months ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆21Updated 2 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆13Updated 3 years ago
- ☆22Updated last year
- Source code of PurPliance analysis tool.☆17Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 5 months ago
- ☆16Updated 2 years ago
- Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature Attribution…☆9Updated 8 months ago
- ☆21Updated 5 years ago
- Extract call graph from apks using Flowdroid.☆19Updated 4 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆55Updated 5 months ago
- ☆22Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆35Updated 2 years ago
- This is source code for ELISE☆9Updated 3 years ago
- ☆11Updated 5 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆16Updated 7 months ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago