Codes for AICS'2019 challenge problem
☆22Oct 13, 2019Updated 6 years ago
Alternatives and similar repositories for aics2019_challenge_adv_mal_defense
Users that are interested in aics2019_challenge_adv_mal_defense are comparing it to the libraries listed below
Sorting:
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆18Nov 28, 2019Updated 6 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- ☆18Apr 4, 2021Updated 4 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆54Apr 15, 2025Updated 10 months ago
- This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.☆29Feb 22, 2024Updated 2 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- ☆59Mar 11, 2018Updated 7 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- 当今海量的移动应用跟人们的生活、工作、学习、休闲、娱乐等方面密切相关,发挥着重要作用。多数APP在安装、更新时,都会向用户申请相关手机权限。多数终端用户缺乏鉴别APP所请求的权限是否合理的能力,并且APP安装使用过程中过度索要权限现象较为普遍,这就给用户数据安全、隐私信息泄…☆13Feb 11, 2020Updated 6 years ago
- 舆情分析系统后端☆11Jun 21, 2021Updated 4 years ago
- This is a sample implementation of "Robust Graph Convolutional Networks Against Adversarial Attacks", KDD 2019.☆10Dec 8, 2020Updated 5 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Reinforcement Learning code for various projects☆10May 30, 2020Updated 5 years ago
- ☆11Jul 12, 2022Updated 3 years ago
- A large-scale database for graph representation learning☆55Oct 6, 2022Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆118Jun 22, 2022Updated 3 years ago
- A fully and partially fake speech dataset for evaluation☆14Nov 11, 2025Updated 3 months ago
- The implementation of paper "Certified Robustness of Graph Convolution Networks for Graph Classification under Topological Attacks"☆13Jun 17, 2021Updated 4 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆14Apr 22, 2024Updated last year
- ☆16Mar 25, 2025Updated 11 months ago
- ☆14Jul 14, 2019Updated 6 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- [Findings of EMNLP 2022] Holistic Sentence Embeddings for Better Out-of-Distribution Detection☆18Jun 14, 2023Updated 2 years ago
- 对抗训练在NLP中的应用☆14Nov 22, 2021Updated 4 years ago
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆15Jul 25, 2020Updated 5 years ago
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Jul 20, 2018Updated 7 years ago
- Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU/TPU, and more☆16Jun 5, 2021Updated 4 years ago
- A Practical Deep Learning-based Android Malware Detection System☆15Nov 4, 2022Updated 3 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- 基于vue和django的在线视频教学网站☆14Mar 30, 2021Updated 4 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Jul 18, 2023Updated 2 years ago
- Detect DDoS attack network traffic from PCAP file using machine learning.☆15Oct 5, 2020Updated 5 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- ☆17Jun 10, 2020Updated 5 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year