lx913 / Security_Papers_CrawlingLinks
Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.
☆12Updated 3 weeks ago
Alternatives and similar repositories for Security_Papers_Crawling
Users that are interested in Security_Papers_Crawling are comparing it to the libraries listed below
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆91Updated last month
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆12Updated 2 weeks ago
- ☆26Updated 8 months ago
- ☆29Updated 9 months ago
- ☆15Updated 6 months ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆44Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆151Updated 3 months ago
- TensorFlow API analysis tool and malicious model detection tool☆29Updated last week
- Data for LLM4Vuln☆11Updated last year
- Academic Papers about LLM Application on Security☆135Updated 3 months ago
- A collection of security papers on top-tier publications☆43Updated 3 weeks ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆81Updated last month
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated last month
- Seminar 2022☆21Updated 2 months ago
- Code and artifacts related to the Asia CCS 2022 paper☆37Updated 3 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆74Updated 4 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆11Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆68Updated 6 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆22Updated last year
- Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG (ISSTA 2025)☆22Updated last week
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆18Updated last year
- ☆26Updated last year
- ☆24Updated 3 years ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆25Updated 10 months ago
- ☆22Updated 9 months ago
- The code will be released soon!☆6Updated 3 years ago
- ☆43Updated 8 months ago