cslfiu / IoTCryptojacking
Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for IoTCryptojacking
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆14Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆13Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆40Updated last year
- ☆30Updated 4 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆26Updated 3 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆33Updated 2 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆58Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- Packet Representation Learning for Traffic Classification☆27Updated last year
- ☆16Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆62Updated last year
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 2 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆11Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆50Updated this week
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆129Updated last year
- ☆19Updated 11 months ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 4 years ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆28Updated last year
- ☆18Updated 10 months ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆16Updated 3 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆13Updated 3 years ago
- Malware Classification using Machine learning☆69Updated last week
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆24Updated 9 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 6 months ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆12Updated 3 years ago