☆21Sep 5, 2022Updated 3 years ago
Alternatives and similar repositories for DMalNet
Users that are interested in DMalNet are comparing it to the libraries listed below
Sorting:
- ☆32Jul 22, 2022Updated 3 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Jan 10, 2022Updated 4 years ago
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆34Dec 9, 2024Updated last year
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- ☆25Nov 22, 2021Updated 4 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- ☆13Jan 30, 2022Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 4 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- ☆24Aug 8, 2025Updated 6 months ago
- Discovering Malicious Functionality through Binary Reconstruction☆59Sep 2, 2021Updated 4 years ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Jan 22, 2024Updated 2 years ago
- CamoDroid is an open-source and open-architecture Android application dynamic analysis environment (sandbox) that is resilient against em…☆33Jan 3, 2022Updated 4 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分析的混合特征的小样本恶意代码分类框架)☆36Dec 27, 2021Updated 4 years ago
- ANOMULY is a general, unsupervised edge anomaly detection framework for multiplex dynamic networks.☆11May 19, 2023Updated 2 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆13Mar 19, 2022Updated 3 years ago
- JavaScript Transformation Techniques Detection☆11Jun 14, 2021Updated 4 years ago
- ☆15Mar 19, 2022Updated 3 years ago
- 「Golang Clouds」是一个专注于 Golang 云原生技术栈的学习平台,涵盖 Go 语言核心、云原生技术、数据库、消息队列、面试宝典等内容!☆12Jan 14, 2026Updated last month
- Ensemble learning with graph neural networks for disease module discovery and classification☆11Nov 5, 2023Updated 2 years ago
- Code for "SUGAR: Subgraph Neural Network with Reinforcement Pooling and Self-Supervised Mutual Information Mechanism""☆10Apr 17, 2021Updated 4 years ago
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- Code release for paper "How good is my GAN?"☆12Mar 9, 2019Updated 6 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆111Jul 25, 2024Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Dec 27, 2020Updated 5 years ago
- ☆18Feb 8, 2024Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Bimodal Adaptive Feature Fusion Network for Person Verification☆20Jul 30, 2022Updated 3 years ago