My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"
☆16Apr 27, 2020Updated 6 years ago
Alternatives and similar repositories for MalGAN
Users that are interested in MalGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Malware Generator Using GANs☆55Jul 25, 2024Updated last year
- ☆18Apr 4, 2021Updated 5 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆129Jul 20, 2018Updated 7 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- A small tutorial to demonstrate the power of CatBoost Algorithm☆11Jun 1, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- [AISTATS 2025] Official implementation of "Adversarial Vulnerabilities in Large Language Models for Time Series Forecasting"☆15Apr 30, 2025Updated last year
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆15May 6, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- This repo implements grid-forming inverters for islanded stability (droop technique) and grid-following inverters for precise power regul…☆18Nov 21, 2023Updated 2 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆27Jul 4, 2022Updated 3 years ago
- Jupyter notebooks for the book "Deep Learning with Python"☆11Aug 24, 2020Updated 5 years ago
- Interpretable Deep Clustering for Tabular Data (ICML 2024)☆18Aug 26, 2025Updated 8 months ago
- ☆23Jan 18, 2018Updated 8 years ago
- ☆11Nov 26, 2019Updated 6 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- 国密算法sm1,sm2,sm3,sm4算 法源码☆12Feb 19, 2018Updated 8 years ago
- Android malware detection using static and dynamic analysis☆41Apr 16, 2019Updated 7 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- TabularBench: Adversarial robustness benchmark for tabular data☆22Apr 25, 2026Updated last week
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- ☆15Jul 28, 2021Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- SM4的优化实现,比官网上的实现快5-6倍☆13May 29, 2019Updated 6 years ago
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 7 years ago
- Web-based terminal emulator for docker containers☆21Mar 21, 2017Updated 9 years ago
- Compilation of peHash implementations.☆15May 2, 2019Updated 7 years ago
- ☆10Sep 9, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generative Adversarial Network to generate malware to evade detection☆15Mar 25, 2023Updated 3 years ago
- Power system state estimation IEEE 14 Bus (Python code)☆27Dec 15, 2020Updated 5 years ago
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 4 years ago
- One Repository of AI Series: Collecting the useful technology articles, opensource tutorials and opensource books. 我的AI系列仓库之一:收集有用的技术文章、开…☆10Nov 14, 2024Updated last year
- TreeNET is a subnet-based topology discovery tool which is built upon ExploreNET, a subnet inference tool.☆11Oct 14, 2019Updated 6 years ago
- False Data Injection Attack Detection in Smart Grid☆24Feb 7, 2023Updated 3 years ago
- 备份文件信息泄露脚本与字典☆16Sep 8, 2021Updated 4 years ago