Source code for 'Lemna: Explaining deep learning based security applications'.
☆24May 15, 2020Updated 5 years ago
Alternatives and similar repositories for LEMNA
Users that are interested in LEMNA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆55Nov 3, 2019Updated 6 years ago
- ☆16Oct 23, 2019Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- ☆13Aug 31, 2024Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Mar 24, 2023Updated 3 years ago
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆74Dec 16, 2021Updated 4 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- ☆21Dec 25, 2023Updated 2 years ago
- Algorithms of rule extraction from neural networks☆35Mar 24, 2023Updated 3 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated 2 years ago
- ☆11Feb 6, 2021Updated 5 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆44Aug 1, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆75Apr 6, 2025Updated last year
- ☆17Jul 17, 2021Updated 4 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆19Nov 22, 2022Updated 3 years ago
- AgentRE-Bench is an agentic benchmark that evaluates state-of-the-art models on long-horizon reverse engineering tasks, measuring their a…☆52Updated this week
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Jul 28, 2020Updated 5 years ago
- A LaTeX beamer theme template for UCAS students.☆12Apr 21, 2024Updated 2 years ago
- ☆14Sep 23, 2024Updated last year
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- A Beamer Theme of UCAS for academic report, thesis and talk.☆18Oct 12, 2024Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆385Mar 24, 2026Updated last month
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆11Jul 11, 2023Updated 2 years ago
- Malice PDF Plugin☆15Jan 7, 2019Updated 7 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Synthesizing Fingerprint from Pattern Type Analysis Features using cGAN - WITC 2019☆12Apr 19, 2019Updated 7 years ago
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 6 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- A School for All Seasons on Trustworthy Machine Learning☆12Jun 30, 2021Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆84Jun 6, 2023Updated 2 years ago
- 第三届阿里云安全算法挑战赛☆37Jul 6, 2023Updated 2 years ago