tsmotlp / AI-Security-Research
A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehensive source for researchers and enthusiasts to stay updated on AI Security trends and findings. Contributions welcome!
☆15Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for AI-Security-Research
- ☆63Updated last year
- ☆46Updated 6 months ago
- Have fun with audit log analysis :)☆143Updated 6 months ago
- ☆90Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated last year
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆75Updated 3 weeks ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆77Updated last year
- Usenix Security'23☆13Updated last year
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 2 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆62Updated last year
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆24Updated 2 years ago
- ☆23Updated 2 years ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆142Updated 2 years ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆19Updated 3 years ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆58Updated last year
- ☆27Updated last year
- Some personal work on DARPA TC engagement5☆15Updated last year
- PPA attack code☆12Updated 2 years ago
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆36Updated 8 months ago
- ☆16Updated 2 years ago
- Flow Interaction Graph based attack traffic detection system.☆137Updated 6 months ago
- FL-based intrusion detection system development using model averaging.☆31Updated last year
- ☆16Updated 11 months ago
- Materials about Encrypted Traffic Analysis☆97Updated this week
- This is source code for ELISE☆9Updated 3 years ago
- ☆14Updated 3 years ago
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆9Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆55Updated last year
- source code for USENIX Security paper xNIDS☆34Updated 2 months ago
- Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis☆122Updated last year