msrocean / continual-learning-malwareLinks
This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to be published at the First Conference on Lifelong Learning Agents (CoLLAs).
☆19Updated last year
Alternatives and similar repositories for continual-learning-malware
Users that are interested in continual-learning-malware are comparing it to the libraries listed below
Sorting:
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated last year
- ☆26Updated last year
- A Python library for Secure and Explainable Machine Learning☆189Updated 4 months ago
- ☆68Updated 5 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Updated 3 years ago
- TabularBench: Adversarial robustness benchmark for tabular data☆19Updated last month
- ☆11Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- ☆149Updated last year
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆221Updated last week
- adversarial malware detection via a principled way☆22Updated 2 years ago
- ☆55Updated 6 years ago
- ☆18Updated last year
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆82Updated 2 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Updated 10 months ago
- A curated list of malware-related papers.☆34Updated last year
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆97Updated last week
- ☆25Updated 2 years ago
- the instructions about request access to AdvDroidZero☆12Updated last year
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Updated 6 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
- Library for training globally-robust neural networks.☆30Updated 3 months ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 5 years ago