using Drebin dataset to distinguish between malwares and not malwares
☆13Jan 5, 2019Updated 7 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- Malware detection using the Drebin dataset☆21Aug 11, 2023Updated 2 years ago
- Detecting and Classifying Android Malware using Deep Learning Techniques☆24Jun 16, 2020Updated 5 years ago
- Drebin - NDSS 2014 Re-implementation☆106Dec 20, 2017Updated 8 years ago
- Dataset created for the Power Line Insulators Inspection Detections☆10Jul 2, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fork of https://github.com/androguard/androguard w/ bug fixes tests☆15Jan 13, 2022Updated 4 years ago
- CNN based android malware detection system☆22Aug 12, 2019Updated 6 years ago
- Re-implementation for paper 'Semi-supervised learning with deep generative models' using lasagne. There is no guarantee for bug free.☆14Jul 3, 2021Updated 4 years ago
- Deep Learning based Intrusion Detection on NSL-KDD Dataset☆13Aug 24, 2019Updated 6 years ago
- Multi-objective reinforcement learning for covid-19 control☆12Aug 12, 2021Updated 4 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- [PyTorch] ClipCap for Japanese (日本語で学習・推論)☆12Oct 4, 2022Updated 3 years ago
- ☆14Apr 10, 2024Updated 2 years ago
- Machine Learning-Based Malicious Application Detecting using Low-level Architectural Features☆11Jun 22, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A practical way to learn Pandas.☆13Aug 11, 2018Updated 7 years ago
- For temperature detection of insulators in Power System☆12Mar 13, 2019Updated 7 years ago
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆20Mar 6, 2023Updated 3 years ago
- anomaly detection algorithm which to predict fraudulent credit card transactions☆14May 14, 2018Updated 7 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- 💯后端面试进阶指南☆26Feb 13, 2019Updated 7 years ago
- Detecting Credit Card Fraud by European users in September 2013. Kaggle link: https://www.kaggle.com/dalpozz/creditcardfraud☆10Jan 6, 2017Updated 9 years ago
- Political Discourse Analysis (PDA) of Political Speech Transcripts using Natural Language Processing (NLP)☆16Apr 28, 2021Updated 4 years ago
- A set of pdf documents used during the fuzzing process☆22Apr 27, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- kmeans for YOLO anchors☆13Jun 15, 2018Updated 7 years ago
- zero shot side scan sonar image classification☆15Mar 29, 2021Updated 5 years ago
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- ☆15Feb 28, 2020Updated 6 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- A curated list of awesome malware analysis tools and resources☆16Mar 14, 2018Updated 8 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code of our IJCAI2021 paper: "Learning Class-Transductive Intent Representations for Zero-shot Intent Detection"☆15Sep 10, 2021Updated 4 years ago
- Design Patterns Tutorial - "Gang of Four" design patterns implemented in Java☆13Jul 27, 2015Updated 10 years ago
- 计算机应用与编程实践,作业备份,数据量大了是真的恶心。。。☆11Dec 12, 2019Updated 6 years ago
- Docker Manager written with NodeJS & Backbone☆26Nov 3, 2013Updated 12 years ago
- Docker container anomaly detection☆12Sep 30, 2015Updated 10 years ago
- A study project which uses Faster-RCNN architecture to detect an insulator from aerial Images captured by UAVs.☆13Aug 2, 2024Updated last year
- Android malware detection using static and dynamic analysis☆40Apr 16, 2019Updated 6 years ago