puzhuoliu / Computer-Security-Conference-Acceptance-RateLinks
Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.
☆179Updated last month
Alternatives and similar repositories for Computer-Security-Conference-Acceptance-Rate
Users that are interested in Computer-Security-Conference-Acceptance-Rate are comparing it to the libraries listed below
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆117Updated 4 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆748Updated last week
- A collection of security papers on top-tier publications☆53Updated last month
- ☆29Updated 11 months ago
- ☆32Updated 5 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆291Updated 9 months ago
- Seminar 2022☆21Updated 2 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆21Updated last year
- ☆22Updated last year
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 3 months ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆43Updated last year
- icml24☆11Updated 6 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆86Updated 7 months ago
- ☆24Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆71Updated 9 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13Updated 4 months ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆15Updated 2 years ago
- ☆20Updated last year
- ☆37Updated 5 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆51Updated 5 months ago
- Academic Papers about LLM Application on Security☆193Updated 2 months ago
- ☆121Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 8 months ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆11Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago