Source code for 'Lemna: Explaining deep learning based security applications'.
☆24May 15, 2020Updated 6 years ago
Alternatives and similar repositories for LEMNA
Users that are interested in LEMNA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆55Nov 3, 2019Updated 6 years ago
- ☆16Oct 23, 2019Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆15Mar 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A library for adversarial classifier evasion☆43Dec 4, 2014Updated 11 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆74Dec 16, 2021Updated 4 years ago
- In this work, we propose a deterministic version of Local Interpretable Model Agnostic Explanations (LIME) and the experimental results o…☆29Jul 6, 2023Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 3 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆42Apr 25, 2024Updated 2 years ago
- Explaining Anomalies Detected by Autoencoders Using SHAP☆44Aug 1, 2021Updated 4 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆77Apr 6, 2025Updated last year
- ☆17Jul 17, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- PUPLOOS计算机操作系统,用于操作系统入门教学☆10Apr 19, 2021Updated 5 years ago
- A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR1…☆11May 19, 2021Updated 5 years ago
- AgentRE-Bench is an agentic benchmark that evaluates state-of-the-art models on long-horizon reverse engineering tasks, measuring their a…☆59May 14, 2026Updated last week
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆78Jul 28, 2020Updated 5 years ago
- Explanation Optimization☆13Oct 16, 2020Updated 5 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆385Mar 24, 2026Updated last month
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆11Jul 11, 2023Updated 2 years ago
- Exploring and improving the quality of ChatGPT-generated code for LeetCode programming tasks.☆11Jan 19, 2024Updated 2 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- Malice PDF Plugin☆15Jan 7, 2019Updated 7 years ago
- bayesian lime☆18Aug 3, 2024Updated last year
- In this work different types of network traffic such as: email, chat, browsing etc were classified using time related features. The main …☆12Mar 14, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- A School for All Seasons on Trustworthy Machine Learning☆12Jun 30, 2021Updated 4 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆85Jun 6, 2023Updated 2 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆13Feb 25, 2026Updated 2 months ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆111Mar 14, 2021Updated 5 years ago
- Implementation of the CL signature scheme☆24Nov 10, 2016Updated 9 years ago