lx913 / Security_Papers_CrawlingLinks
Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.
☆13Updated 2 months ago
Alternatives and similar repositories for Security_Papers_Crawling
Users that are interested in Security_Papers_Crawling are comparing it to the libraries listed below
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆100Updated 3 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆161Updated 3 weeks ago
- ☆29Updated 9 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆47Updated 3 months ago
- A collection of security papers on top-tier publications☆48Updated 2 weeks ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆58Updated 2 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆78Updated 5 months ago
- TensorFlow API analysis tool and malicious model detection tool☆32Updated last month
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆70Updated last year
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆14Updated last month
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆275Updated 7 months ago
- The official code for ``An Engorgio Prompt Makes Large Language Model Babble on''☆12Updated 4 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☆23Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆19Updated 10 months ago
- Seminar 2022☆21Updated this week
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆67Updated 7 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Additional code and data for the automated malware generation paper☆13Updated last year
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆83Updated 5 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆33Updated last month
- ☆31Updated 10 months ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆18Updated last year
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆51Updated 7 years ago
- ☆22Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆84Updated 3 months ago
- Academic Papers about LLM Application on Security☆176Updated 2 weeks ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆19Updated last month
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆13Updated 6 months ago