☆14Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for Datacon2019-Malicious-Code-DataSet-Stage2
Users that are interested in Datacon2019-Malicious-Code-DataSet-Stage2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Jul 14, 2019Updated 6 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated 2 years ago
- 结合cuckoo沙箱调用及报告处理实现基于API调用序列和网络流量的恶意代码检测☆13May 14, 2022Updated 3 years ago
- Optimizer for Malware Detection. Api Calls Sequence of Benign Files are provided.☆15Sep 7, 2023Updated 2 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆110Mar 14, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- DataCon2020大数据安全分析大赛,🏆【方向五】恶意代码分析冠军源码。☆118Nov 17, 2020Updated 5 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- ☆21Sep 5, 2022Updated 3 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Few-Shot malware classification using fused features of static analysis and dynamic analysis (基于静态+动态分 析的混合特征的小样本恶意代码分类框架)☆37Dec 27, 2021Updated 4 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Dataset containing thousands of malware and goodware collected in the Brazilian cyberspace over years.☆21Nov 30, 2020Updated 5 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- 2023年华中科技大学毕业设计 - 基于溯源图的APT攻击检测方法优化☆21Jun 11, 2023Updated 2 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆29Jan 26, 2025Updated last year
- ☆10Mar 5, 2016Updated 10 years ago
- ☆10Jul 2, 2020Updated 5 years ago
- 使用GitHub Actions,每日定时爬取论文信息☆49Jan 10, 2025Updated last year
- Code release for paper "How good is my GAN?"☆12Mar 9, 2019Updated 7 years ago
- Official repository of "SeGA: Preference-Aware Self-Contrastive Learning with Prompts for Anomalous User Detection on Twitter" @ AAAI 202…☆11Nov 30, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- Clustering using Deep Learning (T-SNE visualization of autoencoder embeddings )☆10Mar 3, 2019Updated 7 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- Solves the longest common subsequence problem in Python☆19Dec 16, 2011Updated 14 years ago
- TensorFlow experiment codes of XOR Mixup: Privacy-Preserving Data Augmentation for One-Shot Federated Learning (FL' ICML 2020)☆13Aug 10, 2020Updated 5 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆259Nov 22, 2021Updated 4 years ago
- 2021 CCF BDCI 数字安全公开赛“基于人工智能的恶意软件家族分类”赛题第二名Petrichor战队解决方案☆21Jan 24, 2022Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆38Jul 25, 2021Updated 4 years ago
- Reconstructing the content of image based on paper "Understanding Deep Image Representations by Inverting Them"☆11Jul 30, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- 中文命名体识别,采用pytorch官方提供的BiLSTM+CRF☆15Mar 29, 2019Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Blockchain federated learning☆14Sep 26, 2022Updated 3 years ago
- Generating API Parameter Security Rules with LLM for API Misuse Detection (Accepted by NDSS 2025)☆18Mar 5, 2025Updated last year
- Source code for 'Using and Administering Linux: Volume 2' by David Both☆10Dec 23, 2019Updated 6 years ago
- ☆12Feb 18, 2021Updated 5 years ago