sachith500 / SherlockLinks
This repository contains experiments for different publications at the intersection of Computer Vision and Computer Security.
☆28Updated last year
Alternatives and similar repositories for Sherlock
Users that are interested in Sherlock are comparing it to the libraries listed below
Sorting:
- ☆28Updated 5 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- ☆17Updated 4 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆15Updated 9 months ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Updated 4 years ago
- ☆32Updated 3 years ago
- Malware Classification using Machine learning☆74Updated last year
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆14Updated 4 years ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆74Updated 2 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆20Updated 4 years ago
- ☆26Updated 6 years ago
- The code and data for Dynamic Malware Analysis with Feature Engineering and Feature Learning.☆34Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆30Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软 件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆36Updated 4 years ago
- A neural approach to malware detection in portable executables☆80Updated 2 years ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆55Updated last year
- ☆20Updated 3 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Updated 4 years ago
- Codes for AICS'2019 challenge problem☆22Updated 6 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆110Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆73Updated 2 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆253Updated 4 years ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆88Updated last year
- Official implementation of Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4☆29Updated last year
- ☆38Updated last year
- Dataset with labeled benign and malicious files 🗃️☆147Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆37Updated 3 years ago