Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.
☆220Oct 18, 2025Updated 6 months ago
Alternatives and similar repositories for Computer-Security-Conference-Acceptance-Rate
Users that are interested in Computer-Security-Conference-Acceptance-Rate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆139Apr 17, 2025Updated last year
- RangeSanitizer (RSan) detects spatial and temporal memory errors in C/C++ programs using efficient range checks.☆19Nov 4, 2025Updated 6 months ago
- Deadline countdowns for academic conferences in Security and Privacy☆824Updated this week
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Oct 8, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆23Apr 9, 2024Updated 2 years ago
- YuraScanner☆79Feb 13, 2025Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆101Jan 20, 2025Updated last year
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆52Apr 11, 2024Updated 2 years ago
- Rerousces related to time-travel debugging (TTD)☆41Jan 6, 2026Updated 4 months ago
- ☆10Jun 5, 2023Updated 2 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆196Updated this week
- Academic Papers about LLM Application on Security☆211Mar 26, 2026Updated last month
- Implementation of the Reusable Enclaves paper☆14Sep 25, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Artifacts of the paper "Arcanum: Detecting and Evaluating the Privacy Risks of Browser Extensions on Web Pages and Web Content" in USENIX…☆18Aug 9, 2024Updated last year
- Implementation of anonymous atomic locks described in https://eprint.iacr.org/2019/589☆26Apr 7, 2022Updated 4 years ago
- ☆28Dec 10, 2021Updated 4 years ago
- [NDSS 2024] ReqsMiner is an innovative fuzzing framework developed to discover previously unexamined inconsistencies in CDN forwarding re…☆25Jun 27, 2024Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆343Nov 11, 2025Updated 5 months ago
- Awesome LLM for Cybersecurity☆12Nov 16, 2024Updated last year
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- LLM for System/Software Security☆24Dec 29, 2024Updated last year
- ☆45Jan 30, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆35Aug 20, 2023Updated 2 years ago
- ROS2 package that demonstrates ways to exploit vulnerabilities in ROS systems.☆19Aug 6, 2019Updated 6 years ago
- A continuously updated collection of papers on agentic SE maintained by PurCL group @ Purdue☆627Apr 23, 2026Updated 2 weeks ago
- JAW: A Graph-based Security Analysis Framework for Client-side JavaScript☆118Feb 13, 2026Updated 2 months ago
- Stay updated with the latest deadlines for top Multi-Party Computation (MPC) events, including conferences, journals, and workshops. Neve…☆22Apr 28, 2026Updated last week
- BLEDiff is an automated, scalable, property-agnostic, and black-box protocol noncompliance checker for BLE devices.☆13Mar 31, 2023Updated 3 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆28Jul 31, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆39Oct 24, 2023Updated 2 years ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆47Mar 24, 2026Updated last month
- Good Riddance to EPID Pre-Deprecation Memorial Contest☆13Dec 22, 2023Updated 2 years ago
- The implementation of the 'vSGX: Virtualizing SGX Enclaves on AMD SEV' paper☆56Nov 7, 2023Updated 2 years ago
- ☆15Apr 1, 2025Updated last year
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆33Feb 28, 2022Updated 4 years ago
- VulExplainer: A Transformer-based Hierarchical Distillation for Explaining Vulnerability Types☆19Nov 24, 2023Updated 2 years ago