alipay / ComBERTLinks
☆14Updated 2 years ago
Alternatives and similar repositories for ComBERT
Users that are interested in ComBERT are comparing it to the libraries listed below
Sorting:
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- NLP dataset: Chinese Android Privacy Policy Dataset☆22Updated 9 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆50Updated 6 months ago
- Source code of PurPliance analysis tool.☆18Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 3 years ago
- a secret detection tool☆35Updated 7 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆91Updated 11 months ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆110Updated last year
- ☆30Updated 11 months ago
- Seminar 2022☆23Updated 2 weeks ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- ☆125Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆25Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆54Updated 9 months ago
- ☆31Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆37Updated 7 months ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Updated 4 months ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆61Updated last year
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- ☆54Updated last year
- Project FlowCog (2017)☆27Updated 7 years ago
- This repository holds the code for PolicyLint and PoliCheck, which identifies internal contradictions within privacy policies and analyze…☆61Updated 3 years ago
- ☆14Updated last year