antsecurity / advmlLinks
AI安全
☆35Updated 4 years ago
Alternatives and similar repositories for advml
Users that are interested in advml are comparing it to the libraries listed below
Sorting:
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆220Updated 6 years ago
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- 对抗样本☆272Updated 2 years ago
- AI Model Security Reading Notes☆41Updated 6 months ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆107Updated 4 years ago
- PaddleSleeve☆77Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- Works about detecting vulnerable using ML.☆86Updated 5 years ago
- Trojan Attack on Neural Network☆187Updated 3 years ago
- a demo for detecting anomaly url☆40Updated 8 years ago
- 《Web安全之强化学习与GAN》☆224Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- ☆26Updated 6 years ago
- ☆50Updated 4 years ago
- 阿里云安全恶意程序检测比赛☆115Updated 4 years ago
- ☆172Updated 7 years ago
- 使用CodeBERT来webshell classfication☆36Updated last week
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 4 months ago
- ☆53Updated 4 years ago
- ☆55Updated 5 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆214Updated last year
- ☆84Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆180Updated last month
- ☆14Updated 6 years ago