guoxiaowhu / UCAS_ThesisLinks
The newest template of thesis for UCAS
☆16Updated 2 years ago
Alternatives and similar repositories for UCAS_Thesis
Users that are interested in UCAS_Thesis are comparing it to the libraries listed below
Sorting:
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- ☆16Updated last year
- This repository is used to analysis the shared resources of different containers☆30Updated 10 months ago
- CCF推荐期刊/会议的历年论文数据库。☆101Updated 3 years ago
- 🌟 Notes and codes for Linux Kernel (SJTU-CS353)☆25Updated 4 years ago
- ☆27Updated last year
- A collection of security papers on top-tier publications☆53Updated last month
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆179Updated last month
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆49Updated last year
- ☆12Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆117Updated 5 months ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆24Updated 2 years ago
- Bilingual Resume Template in Latex. 中英双语Latex简历模板☆16Updated last year
- ☆31Updated last year
- ☆61Updated 3 years ago
- This repository contains the code for the paper "A flow-based IDS using Machine Learning in eBPF", Contact: Maximilian Bachl☆104Updated last month
- ☆50Updated 4 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆43Updated last year
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 4 months ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Updated 2 years ago
- ☆38Updated 2 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 4 months ago
- ☆18Updated 10 months ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year
- GAINS: Getting stArted wIth biNary analysiS☆31Updated 3 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆23Updated 10 months ago
- Official repository for ResolverFuzz☆17Updated last year
- AI Model Security Reading Notes☆40Updated 6 months ago
- Latex Template for UCAS Homework☆26Updated 5 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆31Updated 5 months ago