Source code for 'Lemna: Explaining deep learning based security applications'.
☆24May 15, 2020Updated 5 years ago
Alternatives and similar repositories for LEMNA
Users that are interested in LEMNA are comparing it to the libraries listed below
Sorting:
- ☆55Nov 3, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆73Dec 16, 2021Updated 4 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆73Apr 6, 2025Updated 10 months ago
- simd enabled column imprints☆11Feb 12, 2018Updated 8 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆38Oct 2, 2020Updated 5 years ago
- Exploring and improving the quality of ChatGPT-generated code for LeetCode programming tasks.☆11Jan 19, 2024Updated 2 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆84Jan 13, 2022Updated 4 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆45Aug 1, 2021Updated 4 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Jul 28, 2020Updated 5 years ago
- A synthetic training data generator for a text recognition CNN☆10Jul 8, 2019Updated 6 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- A Vue Tab Bar Navigator of Mobile App☆11Jul 10, 2017Updated 8 years ago
- ☆13Apr 28, 2025Updated 10 months ago
- An implementation of RaFM. Xiaoshuang Chen, Yin Zheng, Jiaxiang Wang, et al. "RaFM: Rank-Aware Factorization Machines"☆12May 11, 2019Updated 6 years ago
- Python implementation of 'Secure Spread Spectrum Watermarking for Multimedia' (Cox et al., 1997) using Numpy, Scipy, Pillow☆11Jun 29, 2018Updated 7 years ago
- ☆27Dec 31, 2025Updated 2 months ago
- Explanation Optimization☆13Oct 16, 2020Updated 5 years ago
- A sphinx documentation helper, using the solution of Problem 185 from Project Euler as a test case.☆10Aug 7, 2020Updated 5 years ago
- workaround for AirPod disconnection☆17Apr 22, 2023Updated 2 years ago
- Cryptographic Library for Anonymous Reputation and Credentials☆12Dec 5, 2021Updated 4 years ago
- The all-in-one Sailfish OS local development bootstrapping script☆10Aug 23, 2022Updated 3 years ago
- PUPLOOS计算机操作系统,用于操作系统入门教学☆10Apr 19, 2021Updated 4 years ago
- IOManager tries to bridge the gap in existing async framework to build full async networked database/storage/keyvalue storage☆11Feb 7, 2026Updated 3 weeks ago
- Secure network block device☆11Dec 29, 2016Updated 9 years ago