Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.
☆217Oct 18, 2025Updated 5 months ago
Alternatives and similar repositories for Computer-Security-Conference-Acceptance-Rate
Users that are interested in Computer-Security-Conference-Acceptance-Rate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆137Apr 17, 2025Updated last year
- A semantic-based tool to detect credential leakage in mini-apps.☆17Sep 8, 2024Updated last year
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Oct 8, 2024Updated last year
- ☆23Apr 9, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Deadline countdowns for academic conferences in Security and Privacy☆815Updated this week
- YuraScanner☆76Feb 13, 2025Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated 2 years ago
- implementation of seren☆12Dec 8, 2024Updated last year
- ☆10Jun 5, 2023Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆196Aug 27, 2024Updated last year
- ☆21Jul 1, 2024Updated last year
- Academic Papers about LLM Application on Security☆210Mar 26, 2026Updated 3 weeks ago
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆18Aug 9, 2024Updated last year
- LLM for System/Software Security☆24Dec 29, 2024Updated last year
- ☆28Dec 10, 2021Updated 4 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆342Nov 11, 2025Updated 5 months ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆21Apr 10, 2026Updated last week
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated 2 months ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Aug 29, 2023Updated 2 years ago
- ☆44Jan 30, 2023Updated 3 years ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆118Feb 13, 2026Updated 2 months ago
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 3 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆26Jul 31, 2025Updated 8 months ago
- ☆36Jan 5, 2022Updated 4 years ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22May 6, 2025Updated 11 months ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Practical and Efficient in-TEE Verification of Privacy Compliance☆47Mar 24, 2026Updated 3 weeks ago
- Good Riddance to EPID Pre-Deprecation Memorial Contest☆13Dec 22, 2023Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- A continuously updated collection of CodeLLM papers maintained by PurCL group @ Purdue☆620Jan 14, 2026Updated 3 months ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago
- Firmrec is a recurring vulnerability detector for embedded firmware.☆50May 9, 2025Updated 11 months ago