idramalab / latex-101
☆19Updated last year
Alternatives and similar repositories for latex-101:
Users that are interested in latex-101 are comparing it to the libraries listed below
- Deadline countdowns for academic conferences in Security and Privacy☆680Updated this week
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆205Updated last month
- ☆24Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆128Updated 2 months ago
- A tool for estimating a system's information leakage via Machine Learning☆10Updated 6 months ago
- A single script to facilitate submitting papers to ArXiv.org☆17Updated 6 years ago
- ☆18Updated last year
- A script to check for common mistakes in LaTeX source files of scientific papers.☆24Updated last year
- ☆12Updated 5 months ago
- ACM consolidated LaTeX styles☆65Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Replication package for the SANER 2023 paper titled "Extending Source Code Pre-Trained Language Models to Summarise Decompiled Binaries"☆15Updated 6 months ago
- ☆29Updated last year
- ☆19Updated 10 months ago
- A Python library for Secure and Explainable Machine Learning☆163Updated 2 months ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆179Updated 4 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆48Updated 8 months ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆84Updated last year
- Code for "Astraea: Grammar-based Fairness Testing"☆9Updated 3 years ago
- ☆16Updated last year
- Toolchain to retrieve and parse privacy policies from websites as described in our paper "Unifying Privacy Policy Detection" by Henry Hos…☆16Updated 4 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Privacy Testing for Deep Learning☆195Updated last year
- The Tangled Genealogy of IoT Malware☆11Updated 4 years ago
- ☆55Updated 5 years ago
- Software vulnerabilities data set☆24Updated 4 years ago
- ☆94Updated 2 months ago
- Securing Embedded Systems with Return Address Integrity☆14Updated 5 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago