rulin-jone / Confidential-Laboratory
This project is created for our Confidential Laboratory, which is supported by HEU
☆13Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Confidential-Laboratory
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方 向五(恶意代码分析)季军源码☆103Updated 3 years ago
- Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆59Updated 4 months ago
- Surakav Implementation☆16Updated 6 months ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆25Updated 4 years ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- 每周定期更新论文笔记分享的markdown以及图片☆183Updated 3 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆78Updated 2 years ago
- Codes for WF attacks, defenses☆75Updated last year
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆47Updated 2 years ago
- ☆14Updated 3 years ago
- a residual network for image steganalysis☆18Updated 7 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆26Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- ☆171Updated 6 years ago
- ☆20Updated 5 years ago
- 实现了snort和floodlight控制器的联动从而实现了基于floodlight的入侵防御系统☆17Updated 5 years ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- ☆21Updated 4 years ago
- Codes for AICS'2019 challenge problem☆22Updated 5 years ago
- ☆16Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- ☆11Updated 5 years ago
- AI Model Security Reading Notes☆35Updated 3 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆129Updated last year
- An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.☆67Updated 2 years ago
- 阿里云安全恶意程序检测比赛☆113Updated 3 years ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18Updated 6 years ago
- 提取安卓软件的n-gram特征☆22Updated 6 years ago