☆13Jan 30, 2022Updated 4 years ago
Alternatives and similar repositories for DeepCatra
Users that are interested in DeepCatra are comparing it to the libraries listed below
Sorting:
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Aug 2, 2021Updated 4 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- A Static Sensitive Subgraph-based Feature for Android Malware Detection☆11Aug 27, 2021Updated 4 years ago
- A Federated Learning based Android Malware Classification System☆28Feb 15, 2024Updated 2 years ago
- Official Repository of "Robust Malware Classification via Deep Graph Networks on Call Graph Topologies" (ESANN 2021)☆14Jun 16, 2023Updated 2 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆38Aug 2, 2022Updated 3 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆43Apr 24, 2020Updated 5 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆51Jul 4, 2019Updated 6 years ago
- ☆24Aug 8, 2025Updated 6 months ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆16Apr 21, 2025Updated 10 months ago
- PScout Android permission mappings☆26Mar 30, 2022Updated 3 years ago
- ☆42Aug 6, 2021Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆93Sep 23, 2022Updated 3 years ago
- FL-based intrusion detection system development using model averaging.☆42Dec 18, 2022Updated 3 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆11Nov 14, 2024Updated last year
- ☆10Mar 11, 2023Updated 2 years ago
- PHP ASP 一句话木马,过狗一句话,附带PHP ASP 扫描器,扫描本地文件可疑代码☆10Aug 6, 2019Updated 6 years ago
- Code accompanying our ICML 2020 paper on choice set optimization in group decision-making.☆11Jun 27, 2020Updated 5 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Trust Management for Vehicular Networks☆11Aug 6, 2025Updated 6 months ago
- 「Golang Clouds」是一个专注于 Golang 云原生技术栈的学习平台,涵盖 Go 语言核心、云原生技术、数据库、消息队列、面试宝典等内容!☆12Jan 14, 2026Updated last month
- Here we try to detect the attack at it's first attempt using machine learning algorithms(Reinforcement l)☆11Apr 27, 2020Updated 5 years ago
- Code for "SUGAR: Subgraph Neural Network with Reinforcement Pooling and Self-Supervised Mutual Information Mechanism""☆10Apr 17, 2021Updated 4 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Marble FHE Library☆18Dec 23, 2020Updated 5 years ago
- A fully and partially fake speech dataset for evaluation☆14Nov 11, 2025Updated 3 months ago
- Code and data release for CCS'2022 paper "Understanding IoT Security from a Market-Scale Perspective"☆12Apr 13, 2023Updated 2 years ago
- Grey-box fuzzer SIVO☆13Jul 11, 2021Updated 4 years ago
- Bimodal Adaptive Feature Fusion Network for Person Verification☆20Jul 30, 2022Updated 3 years ago
- We propose a novel adversarial example generation technique (i.e., CODA) for testing deep code models. Its key idea is to use code differ…☆19Oct 8, 2023Updated 2 years ago
- ☆12Nov 19, 2022Updated 3 years ago
- ☆14Apr 10, 2024Updated last year
- ☆16Mar 25, 2025Updated 11 months ago
- ☆12Sep 29, 2019Updated 6 years ago