Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Security 2019.
☆11Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Robust-PDF-Classifier-with-Conserved-Features
Users that are interested in Robust-PDF-Classifier-with-Conserved-Features are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Corresponding code to "FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems" @ CVPR 2021☆13Jun 22, 2021Updated 4 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- CNN for detecting malicious PDF☆11Jul 25, 2024Updated last year
- AI IDS Application for IoT Dataset☆18Aug 26, 2021Updated 4 years ago
- (AST-based + variables' name info) malicious JavaScript detection system, concept from Zozzle☆16Nov 10, 2019Updated 6 years ago
- It's a malware detection API for Windows malware utilizing Artificial Neural network.☆19Aug 2, 2024Updated last year
- A Deep Learning ensemble that classifies Windows executable files as either benign, ransomware, or other malware.☆27Jul 4, 2019Updated 6 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Intrusion Detection System for IoT Devices☆22Nov 23, 2022Updated 3 years ago
- This project aims to detect if a pdf file is clean or malicious using Machine Leaning Techniques☆22Apr 15, 2022Updated 3 years ago
- ☆13Aug 31, 2024Updated last year
- ☆11Feb 8, 2026Updated last month
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆17Aug 27, 2022Updated 3 years ago
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆25Dec 20, 2020Updated 5 years ago
- ☆10Nov 4, 2016Updated 9 years ago
- Javascript AST to CFG converter☆21Jun 12, 2016Updated 9 years ago
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- 从美国国家漏洞库NVD获取某个特定版本软件的漏洞统计信息。☆16Mar 29, 2022Updated 3 years ago
- ☆30Nov 29, 2021Updated 4 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 2 years ago
- ☆12Apr 25, 2025Updated 10 months ago
- ☆31Nov 24, 2022Updated 3 years ago
- Modular static malicious JavaScript detection system☆75Jan 18, 2021Updated 5 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- Test equality between a black-box LLM API and a reference distribution☆12Oct 29, 2024Updated last year
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- ☆15Jul 24, 2022Updated 3 years ago
- A Python Software which helps you manage your password offline☆11Sep 10, 2021Updated 4 years ago
- ☆14Oct 17, 2024Updated last year
- Ensemble learning with graph neural networks for disease module discovery and classification☆11Nov 5, 2023Updated 2 years ago
- Make simple leaderboard for machine learning competition using Flask☆12Jun 18, 2024Updated last year
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago
- Code for the paper: "AOC-IDS: Autonomous Online Framework with Contrastive Learning for Intrusion Detection" (Infocom 2024)☆35Dec 6, 2024Updated last year
- ☆15Mar 19, 2022Updated 4 years ago
- A Recipe for Building LLM Reasoners to Solve Complex Instructions☆31Oct 9, 2025Updated 5 months ago
- Implementation of "Deep Private-Feature Extraction (DPFE)"☆11Oct 1, 2018Updated 7 years ago
- ☆14Jun 6, 2023Updated 2 years ago
- converting malware .bytes file to image☆10Apr 19, 2019Updated 6 years ago