☆14Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Datacon2019-Malicious-Code-DataSet-Stage2
Users that are interested in Datacon2019-Malicious-Code-DataSet-Stage2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Jul 14, 2019Updated 6 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆15Mar 10, 2024Updated 2 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆21Jun 11, 2023Updated 2 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆30Jan 26, 2025Updated last year
- ☆10Mar 5, 2016Updated 10 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- 使用GitHub Actions,每日定时爬取论文信息☆50Jan 10, 2025Updated last year
- Code release for paper "How good is my GAN?"☆12Mar 9, 2019Updated 7 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆10Nov 30, 2024Updated last year
- FeGAN: Scaling Distributed GANs☆14Dec 31, 2020Updated 5 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12Nov 10, 2020Updated 5 years ago
- TensorFlow experiment codes of XOR Mixup: Privacy-Preserving Data Augmentation for One-Shot Federated Learning (FL' ICML 2020)☆13Aug 10, 2020Updated 5 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆257Nov 22, 2021Updated 4 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆21Jan 24, 2022Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆39Jul 25, 2021Updated 4 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- 中文命名体识别,采用pytorch官方提供的BiLSTM+CRF☆15Mar 29, 2019Updated 7 years ago
- Mining Frequent Sequential Patterns under Differential Privacy☆16May 22, 2014Updated 11 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Blockchain federated learning☆14Sep 26, 2022Updated 3 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Mar 5, 2025Updated last year
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- 爬取百度指数数据☆12Dec 8, 2022Updated 3 years ago
- Encrypted Client Hello (ECH) config parser and generator.☆11Feb 21, 2025Updated last year
- This repository is used to store recording about papers and presentations readed.☆18Aug 8, 2024Updated last year
- pyprefixspan - Python implementation for the algorithm PrefixSpan (Prefix-projected Sequential Pattern mining).☆11Jan 26, 2018Updated 8 years ago