antsecurity / advmlLinks
AI安全
☆35Updated 4 years ago
Alternatives and similar repositories for advml
Users that are interested in advml are comparing it to the libraries listed below
Sorting:
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆217Updated 6 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- 对抗样本☆268Updated 2 years ago
- Robustness benchmark for DNN models.☆67Updated 3 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆106Updated 4 years ago
- AI Model Security Reading Notes☆39Updated 5 months ago
- PaddleSleeve☆77Updated last year
- 《Web安全之强化学习与GAN》☆224Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- ☆26Updated 6 years ago
- TensorFlow API analysis tool and malicious model detection tool☆33Updated 3 months ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- a demo for detecting anomaly url☆40Updated 8 years ago
- ☆35Updated last year
- Seminar 2016☆25Updated last year
- A collection of security papers on top-tier publications☆52Updated last month
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆213Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆140Updated 2 years ago
- ☆13Updated 6 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆46Updated 3 years ago
- Works about detecting vulnerable using ML.☆86Updated 5 years ago
- ☆50Updated 4 years ago
- Trojan Attack on Neural Network☆187Updated 3 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆24Updated 5 years ago
- 阿里云安全恶意程序检测比赛☆115Updated 4 years ago