Some Conferences' accepted paper lists (including Network, Security, AI) 顶会近五年论文列表
☆77Oct 14, 2025Updated 5 months ago
Alternatives and similar repositories for Conference-Accepted-Paper-List
Users that are interested in Conference-Accepted-Paper-List are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 18, 2025Updated 10 months ago
- Packet Representation Learning for Traffic Classification☆34Dec 19, 2024Updated last year
- [MM'23] ProTegO: Protect Text Content against OCR Extraction Attack☆14Mar 12, 2024Updated 2 years ago
- Source code of NAACL 2025 Findings "Scaling Up Membership Inference: When and How Attacks Succeed on Large Language Models"☆15Dec 16, 2025Updated 3 months ago
- The source code of [WWW 2025] MoDiCF☆12Jul 12, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 6 months ago
- ☆11Dec 23, 2024Updated last year
- ☆18Jul 18, 2024Updated last year
- Source code related to the research paper entitled RVENet: A Large Echocardiographic Dataset for the Deep Learning-Based Assessment of Ri…☆12Mar 10, 2024Updated 2 years ago
- ☆13Feb 21, 2025Updated last year
- ☆11Oct 7, 2023Updated 2 years ago
- Code for CVPR2018 "Iterative Learning with Open-set Noisy Labels"☆12Mar 12, 2021Updated 5 years ago
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆61Jan 7, 2025Updated last year
- ☆21Jul 26, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- [ICLR 2025] Breaking Mental Set to Improve Reasoning through Diverse Multi-Agent Debate☆19Apr 22, 2025Updated 11 months ago
- ☆14Feb 12, 2024Updated 2 years ago
- ☆21May 23, 2025Updated 10 months ago
- ☆18Aug 15, 2022Updated 3 years ago
- ☆13Jan 14, 2026Updated 2 months ago
- ☆11Feb 22, 2024Updated 2 years ago
- ☆13Oct 20, 2020Updated 5 years ago
- ☆15Apr 13, 2023Updated 2 years ago
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 10 months ago
- Code for Mateen: Adaptive Ensemble Learning for Network Anomaly Detection☆17Feb 27, 2025Updated last year
- ☆25Apr 15, 2024Updated last year
- 基于铜锁密码库开发的商用密码工具箱桌面应用程序☆13Feb 5, 2025Updated last year
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- Memory-optimized training scripts for video models based on Diffusers☆14Jan 3, 2025Updated last year
- Open leaderboard for browser agents☆32Updated this week
- ☆17Updated this week
- Beyond Known Clusters: Probe New Prototypes for Efficient Generalized Class Discovery☆16Apr 28, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AutoML4ETC, a tool to automatically design efficient and high-performing neural architectures for encrypted traffic classification.☆12Feb 19, 2024Updated 2 years ago
- Kernel Herding for probability density estimation☆14Feb 23, 2016Updated 10 years ago