antsecurity / advmlLinks
AI安全
☆35Updated 5 years ago
Alternatives and similar repositories for advml
Users that are interested in advml are comparing it to the libraries listed below
Sorting:
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆226Updated 6 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- PaddleSleeve☆78Updated last year
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- 对抗样本☆276Updated 3 years ago
- AI Model Security Reading Notes☆43Updated 9 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆109Updated 4 years ago
- TensorFlow API analysis tool and malicious model detection tool☆37Updated 7 months ago
- 《Web安全之强化学习与GAN》☆225Updated 5 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- Trojan Attack on Neural Network☆190Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago
- ☆55Updated 6 years ago
- Project FlowCog (2017)☆27Updated 7 years ago
- ☆27Updated 6 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- A collection of security papers on top-tier publications☆59Updated this week
- ☆49Updated 5 years ago
- 每日论文推荐☆293Updated 4 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- SecCodeBench is a benchmark suite focusing on evaluating the security of code generated by large language models (LLMs).☆86Updated 2 months ago
- 阿里云安全恶意程序检测比赛☆116Updated 4 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆218Updated last year
- ☆14Updated 6 years ago
- a demo for detecting anomaly url☆40Updated 8 years ago
- ☆172Updated 7 years ago