Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.
☆216Oct 18, 2025Updated 5 months ago
Alternatives and similar repositories for Computer-Security-Conference-Acceptance-Rate
Users that are interested in Computer-Security-Conference-Acceptance-Rate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆138Apr 17, 2025Updated 11 months ago
- A semantic-based tool to detect credential leakage in mini-apps.☆18Sep 8, 2024Updated last year
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- ☆23Apr 9, 2024Updated last year
- Deadline countdowns for academic conferences in Security and Privacy☆811Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- YuraScanner☆73Feb 13, 2025Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated last year
- ☆10Jun 5, 2023Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆199Aug 27, 2024Updated last year
- ☆21Jul 1, 2024Updated last year
- Academic Papers about LLM Application on Security☆211Updated this week
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- ☆27Dec 10, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆97Jan 20, 2025Updated last year
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆340Nov 11, 2025Updated 4 months ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆21Updated this week
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated last month
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- ☆43Jan 30, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Good Riddance to EPID Pre-Deprecation Memorial Contest☆12Dec 22, 2023Updated 2 years ago
- ROS2 package that demonstrates ways to exploit vulnerabilities in ROS systems.☆19Aug 6, 2019Updated 6 years ago
- ☆35Aug 20, 2023Updated 2 years ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆119Feb 13, 2026Updated last month
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- ☆36Jan 5, 2022Updated 4 years ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22May 6, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆10Sep 25, 2024Updated last year
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Jan 10, 2025Updated last year
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆55Nov 7, 2023Updated 2 years ago
- Moxa Nport devices enumerate script☆16Apr 9, 2016Updated 9 years ago
- A continuously updated collection of CodeLLM papers maintained by PurCL group @ Purdue☆614Jan 14, 2026Updated 2 months ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago