idramalab / latex-101Links
☆21Updated 2 years ago
Alternatives and similar repositories for latex-101
Users that are interested in latex-101 are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆797Updated this week
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- ☆30Updated 3 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆223Updated last month
- ☆32Updated 2 years ago
- Code and data for "Detecting Stance in Media on Global Warming".☆15Updated 3 years ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆242Updated 2 months ago
- A tool to detect potentially hallucinated or fabricated references in academic PDF papers.☆55Updated this week
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Updated 5 months ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Updated 4 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆102Updated 2 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Updated 6 years ago
- A tool for estimating a system's information leakage via Machine Learning☆10Updated last year
- Discovering Malicious Functionality through Binary Reconstruction☆59Updated 4 years ago
- ☆18Updated last year
- ☆14Updated last year
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆17Updated last year
- Effects of packers on machine-learning-based malware classifiers that use only static analysis☆89Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 5 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- A Python library for Secure and Explainable Machine Learning☆190Updated 7 months ago
- A Unified Approach to Evaluate and Compare Explainable AI methods☆14Updated 2 years ago
- ☆22Updated 5 years ago
- Exercises for practicing MLSec for Systems Security☆10Updated last year
- Catalog of abusive language data (PLoS 2020)☆321Updated last year
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- IoT Security Reading List☆62Updated 5 years ago
- NLP tool to extract dimensions of social exchange from textual conversations☆11Updated last year