sec-deadlines / sec-deadlines.github.ioLinks
Deadline countdowns for academic conferences in Security and Privacy
☆797Updated last week
Alternatives and similar repositories for sec-deadlines.github.io
Users that are interested in sec-deadlines.github.io are comparing it to the libraries listed below
Sorting:
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆213Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆133Updated 9 months ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 4 years ago
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- ☆35Updated 2 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆327Updated 2 months ago
- ☆27Updated 2 years ago
- A tool to detect potentially hallucinated or fabricated references in academic PDF papers.☆55Updated this week
- ☆22Updated last year
- Main source code repository of the Tamarin prover for security protocol verification.☆505Updated this week
- A set of exercises for getting started with the Tamarin prover☆20Updated 2 years ago
- ☆32Updated 2 years ago
- Prototype system for the paper "OAT: Attesting Operation Integrity of Embedded Devices"(Oakland'20)☆16Updated 5 years ago
- Raspbian with OP-TEE support.☆30Updated 6 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆171Updated 2 years ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 7 years ago
- ☆102Updated 9 months ago
- An awesome list of papers on privacy attacks against machine learning☆634Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆17Updated last year
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 6 months ago
- Downloads apks from androzoo repository https://androzoo.uni.lu/☆127Updated 3 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆27Updated 5 years ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆198Updated last year
- Messaging protocol test tools☆16Updated 4 years ago
- ABY - A Framework for Efficient Mixed-protocol Secure Two-party Computation☆491Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- Supplementary code and data to "Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning"☆77Updated 6 years ago
- A series of classic oblivious algorithms written in Python, covering oblivious RAM, oblivious MAP, and oblivious graph processing for cli…☆12Updated last week
- Seminar 2022☆23Updated 3 weeks ago