We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.
☆27Jul 4, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-GAN-attack
Users that are interested in Malware-GAN-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆129Jul 20, 2018Updated 7 years ago
- Adversarial Malware Generator Using GANs☆55Jul 25, 2024Updated last year
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题 空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆40Jul 25, 2021Updated 4 years ago
- My replication of the paper "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN"☆16Apr 27, 2020Updated 6 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official Implementation of NIPS 2022 paper Pre-activation Distributions Expose Backdoor Neurons☆15Jan 13, 2023Updated 3 years ago
- ☆12Dec 26, 2024Updated last year
- This repository contains the official implementation of the paper entitled with "FedAPEN: Personalized Cross-silo Federated Learning with…☆14Dec 4, 2023Updated 2 years ago
- PPA attack code☆12Aug 9, 2022Updated 3 years ago
- Surrogate Model Extension (SME): A Fast and Accurate Weight Update Attack on Federated Learning [Accepted at ICML 2023]☆14Mar 31, 2024Updated 2 years ago
- Demo code for connecting the Raspberry Pi and the Melexis MLX90620 16x4 thermopile array.☆12May 6, 2015Updated 11 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆40Aug 2, 2022Updated 3 years ago
- Implementation for NIPS2023: A Unified Solution for Privacy and Communication Efficiency in Vertical Federated Learning☆15Apr 25, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Sep 9, 2016Updated 9 years ago
- Thread-Safe Pools / Distributed Pools for Common Lisp.☆15Jan 20, 2026Updated 3 months ago
- AIBOM Workshop RSA 2024☆15May 20, 2024Updated last year
- Common Lisp implementation of the Erlang External Term Format☆16Dec 31, 2022Updated 3 years ago
- Personalized Federated Learning under Mixture of Distributions☆19Jan 2, 2024Updated 2 years ago
- SIMD implementation of argmin and argmax☆12Jul 2, 2024Updated last year
- ☆18Jan 27, 2022Updated 4 years ago
- ☆24May 26, 2021Updated 4 years ago
- Code for pFedFDA: Personalized Federated Learning via Feature Distribution Adaptation (NeurIPS 2024)☆19Nov 14, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Jul 25, 2024Updated last year
- [IEEE S&P'24] ODSCAN: Backdoor Scanning for Object Detection Models☆22Oct 5, 2025Updated 7 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆12Sep 19, 2023Updated 2 years ago
- FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).☆16Jul 6, 2024Updated last year
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Image to LaTeX pytorch model☆14Jul 6, 2023Updated 2 years ago
- This is a JSON parser implemented in Coalton.☆11Jun 2, 2024Updated last year
- ☆11Jun 29, 2021Updated 4 years ago
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a common lisp library for data analysis and manipulation☆12May 28, 2023Updated 2 years ago
- [WIP] Common Lisp meets Apple Silicon GPU☆12Aug 30, 2024Updated last year
- Simple and Fast ProgressBar Library for Common Lisp. (Reimplementation of cl-cram)☆13Aug 6, 2024Updated last year
- Intrusion Detection Systems (IDS)☆11Aug 18, 2015Updated 10 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- The code implementation of GraCeFul (Accepted in COLING 2025)☆13Jan 27, 2025Updated last year
- Read and write Numpy .npy and .npz files.☆18Sep 19, 2023Updated 2 years ago