☆27Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Datacon2019-Malicious-Code-DataSet-Stage1
Users that are interested in Datacon2019-Malicious-Code-DataSet-Stage1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 14, 2019Updated 6 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 5 years ago
- ☆25Nov 22, 2021Updated 4 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 使用GitHub Actions,每日定时爬取论文信息☆49Jan 10, 2025Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- ☆32Jul 22, 2022Updated 3 years ago
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Jan 22, 2024Updated 2 years ago
- A new version used Androguard but not Soot to realize MaMadroid。☆19Mar 17, 2021Updated 5 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Nov 17, 2020Updated 5 years ago
- Netgpt: Generative pretrained transformer for network traffic☆32Jan 10, 2025Updated last year
- ☆172Aug 29, 2018Updated 7 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆54Feb 17, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Dec 25, 2023Updated 2 years ago
- : An LLM Approach for Open-Set Encrypted Traffic Classification☆59Nov 5, 2025Updated 4 months ago
- DeepLocker - Deep learning based malware☆34Nov 7, 2018Updated 7 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- ☆11Jan 5, 2022Updated 4 years ago
- 中国科学信息科学latex模板。可以在texlive 2014 + texstudio下使用☆10Aug 2, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆89Feb 1, 2021Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- ☆50Jan 19, 2019Updated 7 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- Pure Java parser for PHP programs, used by the Pixy project.☆20Nov 24, 2020Updated 5 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆144Mar 25, 2023Updated 3 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- TensorFlow experiment codes of XOR Mixup: Privacy-Preserving Data Augmentation for One-Shot Federated Learning (FL' ICML 2020)☆13Aug 10, 2020Updated 5 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- 中文命名体识别,采用pytorch官方提供的BiLSTM+CRF☆15Mar 29, 2019Updated 6 years ago
- To mitigate position bias in LLMs, especially in long-context scenarios, we scale only one dimension of LLMs, reducing position bias and …☆11Jun 18, 2024Updated last year
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Blockchain federated learning☆14Sep 26, 2022Updated 3 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago