the instructions about request access to AdvDroidZero
☆13Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for AdvDroidZero-Access-Instructions
Users that are interested in AdvDroidZero-Access-Instructions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 4, 2021Updated 5 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 3 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆32May 12, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆29Nov 23, 2022Updated 3 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆150Nov 21, 2023Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆56May 14, 2024Updated 2 years ago
- Ungrafting Malicious Code from Piggybacked Android Apps☆14Sep 27, 2016Updated 9 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆59Oct 19, 2023Updated 2 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆76Sep 2, 2022Updated 3 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆67Feb 21, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Seminar 2022☆25Mar 19, 2026Updated 2 months ago
- ☆24Apr 17, 2020Updated 6 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆96Sep 23, 2022Updated 3 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆12Nov 7, 2025Updated 6 months ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- A list of academic papers related to Docker containers & Docker Hub☆28Apr 16, 2026Updated last month
- This repository contains the official implementation of the paper "GL2GPU: Accelerating WebGL Applications via Dynamic API Translation to…☆40Jun 10, 2025Updated 11 months ago
- revised☆23Jul 26, 2020Updated 5 years ago
- ☆31Jan 17, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆40Jul 25, 2021Updated 4 years ago
- ☆11Jul 2, 2025Updated 10 months ago
- PDiff: Semantic-based Patch Presence Testing for Downstream Kernels☆14Nov 8, 2020Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆54Jul 4, 2019Updated 6 years ago
- RISC-V Security HC admin repo☆17Jan 7, 2025Updated last year
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆39Aug 2, 2021Updated 4 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆52Jan 10, 2022Updated 4 years ago
- Android Third-Party-Libraries Detector which is resilient to non-structure-preserving obfuscations.☆11May 14, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CV to use for PhD position applications☆22Sep 6, 2021Updated 4 years ago
- Hack@DAC 2021☆19Jul 24, 2024Updated last year
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆16Feb 19, 2024Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- Additional code and data for the automated malware generation paper☆13Updated this week
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆17Nov 30, 2021Updated 4 years ago