☆34Dec 9, 2025Updated 2 months ago
Alternatives and similar repositories for code
Users that are interested in code are comparing it to the libraries listed below
Sorting:
- ☆10Dec 30, 2020Updated 5 years ago
- ☆12Aug 4, 2018Updated 7 years ago
- [ACL 2024 Findings] This is the code for our paper "Knowledge-Infused Prompting: Assessing and Advancing Clinical Text Data Generation wi…☆41Jun 23, 2024Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆199Apr 12, 2025Updated 10 months ago
- Consensus Based Distributed Stochastic Gradient Descent☆11Jun 24, 2018Updated 7 years ago
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Towards Memorization-Free Diffusion Models (CVPR2024) Codebase☆12Jun 2, 2024Updated last year
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- ✨Frontend of CTFgo.☆11Apr 10, 2022Updated 3 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- ☆11Dec 29, 2022Updated 3 years ago
- 利用connect、tcpsyn、tcpfin、udp实现端口扫描,使用socket☆11Jul 17, 2020Updated 5 years ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- Codes for GReTo accepted by ICLR2023☆12Mar 12, 2023Updated 2 years ago
- A Guide for Encode Categorical Variables, with implementations and examples in Python.☆11Sep 9, 2020Updated 5 years ago
- malicious bash scripts☆10Apr 3, 2022Updated 3 years ago
- 基于X86架构的简单Cminus语言编译器☆10Apr 1, 2022Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- AES文件加密解密☆10Apr 26, 2023Updated 2 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆66Nov 14, 2025Updated 3 months ago
- A curated collection of papers and related projects on using LLMs for privacy.☆25Oct 8, 2025Updated 4 months ago
- ☆11Jul 8, 2024Updated last year
- ☆10Jun 16, 2022Updated 3 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 5 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Nopeek experiments☆14Jun 12, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- MATLAB toolbox for performing modal analysis using experimental data☆11Jun 23, 2022Updated 3 years ago
- enchmarking Large Language Models' Resistance to Malicious Code☆14Dec 1, 2024Updated last year
- Gradient-based Next-best-view Planning☆16Nov 20, 2024Updated last year
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- FEM micromagnetic simulator☆11Updated this week
- RWKV6 in native pytorch and triton:)☆11Aug 4, 2024Updated last year
- ☆14Jul 4, 2022Updated 3 years ago
- ☆12Jun 23, 2023Updated 2 years ago
- ☆12Oct 2, 2023Updated 2 years ago