csmutz / pdfrateLinks
☆13Updated last year
Alternatives and similar repositories for pdfrate
Users that are interested in pdfrate are comparing it to the libraries listed below
Sorting:
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Updated 6 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated last year
- Defense from the 2020 Microsoft Evasion Competition☆17Updated 4 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Updated 6 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19Updated 7 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆92Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆29Updated 4 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Updated 2 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Updated 6 years ago
- Malware Classification using Machine learning☆76Updated last year
- PDF Malware Parser☆20Updated 9 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Updated 3 years ago
- ☆28Updated 5 years ago
- ☆38Updated last year
- ☆80Updated 6 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Updated 8 years ago
- Datasets used in the StreamSpot experiments☆66Updated 9 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆40Updated last year
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Updated 7 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Updated 7 years ago
- ☆25Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆39Updated last year
- The Tangled Genealogy of IoT Malware☆12Updated 5 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- ☆11Updated last year