guoxiaowhu / UCAS_ThesisLinks
The newest template of thesis for UCAS
☆16Updated 2 years ago
Alternatives and similar repositories for UCAS_Thesis
Users that are interested in UCAS_Thesis are comparing it to the libraries listed below
Sorting:
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- This repository is used to analysis the shared resources of different containers☆31Updated 11 months ago
- ☆16Updated last year
- CCF推荐期刊/会议的历年论文数据库。☆102Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆181Updated last month
- ☆61Updated 3 years ago
- ☆27Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆46Updated last year
- ☆32Updated 5 months ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated 2 years ago
- ☆13Updated last year
- ☆34Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆119Updated 5 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 5 months ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆15Updated 6 months ago
- ☆38Updated 2 years ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆26Updated 4 months ago
- icml24☆11Updated 7 months ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆47Updated 3 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 4 months ago
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover☆30Updated 5 months ago
- ☆21Updated 6 months ago
- Official code of Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning☆42Updated last year
- A collection of security papers on top-tier publications☆55Updated 2 weeks ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆11Updated last year
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Website for Research Artifacts from the Security Community☆27Updated 2 weeks ago
- AI Model Security Reading Notes☆41Updated 6 months ago
- A general cross-architecture C/C++ hotpatch solution using customized userspace eBPF runtime. One patch release can fix the same vulnera…☆26Updated last year