puzhuoliu / Computer-Security-Conference-Acceptance-Rate
Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.
☆129Updated 3 months ago
Alternatives and similar repositories for Computer-Security-Conference-Acceptance-Rate:
Users that are interested in Computer-Security-Conference-Acceptance-Rate are comparing it to the libraries listed below
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆72Updated 7 months ago
- Academic Papers about LLM Application on Security☆118Updated last week
- A collection of security papers on top-tier publications☆39Updated last week
- ☆29Updated 2 months ago
- ☆19Updated 10 months ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- ☆28Updated 4 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆240Updated 2 months ago
- ☆32Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆33Updated 10 months ago
- ☆18Updated last year
- Seminar 2022☆22Updated last week
- Deadline countdowns for academic conferences in Security and Privacy☆685Updated this week
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆180Updated 5 months ago
- ACM consolidated LaTeX styles☆65Updated 5 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆32Updated 3 weeks ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆36Updated 3 months ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- ☆24Updated 4 months ago
- Privacy-preserving Federated Learning with Trusted Execution Environments☆64Updated last year
- Goten: GPU-Outsourcing Trusted Execution of Neural Network Training and Prediction☆31Updated 4 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆80Updated 3 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆11Updated last year
- ☆50Updated 4 years ago
- ☆25Updated last year
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated last month
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago