jinxmirror13 / BETH_Dataset_Analysis
☆12Updated 2 years ago
Related projects: ⓘ
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated last year
- Malware Bypass Research using Reinforcement Learning☆99Updated 4 months ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 3 years ago
- ☆10Updated 2 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆41Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 5 years ago
- A Simulated Optimal Intrusion Response Game☆19Updated 2 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆190Updated this week
- A general method for training cost-sensitive robust classifier☆21Updated 5 years ago
- ☆11Updated 3 weeks ago
- ☆19Updated 2 years ago
- ☆10Updated last year
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆17Updated 6 months ago
- ☆74Updated 4 years ago
- ☆21Updated 4 years ago
- Automated Yara Rule generation using Biclustering☆58Updated 3 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆29Updated 6 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Updated 5 years ago
- Adversarial Malware Generator Using GANs☆49Updated last month
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Updated last year
- Pytorch implementation of MalConv☆69Updated 2 years ago
- ☆12Updated 2 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆58Updated 3 years ago
- ☆50Updated last year
- Game-Theoretic Adversarial Machine Learning Library☆56Updated 5 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆16Updated 2 years ago
- ☆10Updated 2 years ago
- ☆27Updated 6 months ago