alipay / ComBERTLinks
☆14Updated 2 years ago
Alternatives and similar repositories for ComBERT
Users that are interested in ComBERT are comparing it to the libraries listed below
Sorting:
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆41Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- NLP dataset: Chinese Android Privacy Policy Dataset☆22Updated 7 months ago
- ☆52Updated last year
- CyberMetric dataset☆107Updated 10 months ago
- Source code of PurPliance analysis tool.☆17Updated last year
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆130Updated last year
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆55Updated 2 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Updated 3 years ago
- TensorFlow API analysis tool and malicious model detection tool☆36Updated 5 months ago
- Extract call graph from apks using Flowdroid.☆20Updated 5 years ago
- AI Model Security Reading Notes☆43Updated 7 months ago
- ☆31Updated last year
- ☆22Updated 5 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆59Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆88Updated 9 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆45Updated 5 months ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆74Updated 11 months ago
- AI安全☆35Updated 4 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆25Updated last year
- ☆37Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆51Updated 7 months ago
- Seminar 2022☆21Updated last month
- ☆123Updated last year
- ☆11Updated 6 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Updated 5 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated last year
- a secret detection tool☆24Updated 6 months ago
- Agent Security Bench (ASB)☆141Updated last week