idramalab / latex-101
☆19Updated last year
Alternatives and similar repositories for latex-101
Users that are interested in latex-101 are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆711Updated this week
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 5 months ago
- ☆13Updated 9 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- ☆25Updated 3 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆54Updated 3 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆209Updated 5 months ago
- ☆22Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆88Updated last month
- ☆19Updated last year
- A Python library for Secure and Explainable Machine Learning☆176Updated 3 months ago
- ☆31Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Updated 4 years ago
- A single script to facilitate submitting papers to ArXiv.org☆17Updated 7 years ago
- Code for "Astraea: Grammar-based Fairness Testing"☆10Updated 3 years ago
- Toolchain to retrieve and parse privacy policies from websites as described in our paper "Unifying Privacy Policy Detection" by Henry Hos…☆16Updated last month
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆185Updated 8 months ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆86Updated 11 months ago
- ☆144Updated 7 months ago
- ☆22Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated last year
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆12Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Implementations of 3 phishing detection and identification baselines☆17Updated 5 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆18Updated last year
- Supplementary Material for XFL☆19Updated 7 months ago
- IoT Security Reading List☆62Updated 5 years ago