tsmotlp / AI-Security-Research
A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehensive source for researchers and enthusiasts to stay updated on AI Security trends and findings. Contributions welcome!
☆18Updated last year
Alternatives and similar repositories for AI-Security-Research:
Users that are interested in AI-Security-Research are comparing it to the libraries listed below
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆249Updated 4 months ago
- ☆74Updated last year
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆11Updated 2 years ago
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆108Updated last year
- ☆46Updated 2 months ago
- Flash-IDS is an open-source system developed by the DART Laboratory for advanced intrusion detection using provenance graph representatio…☆60Updated 10 months ago
- PPA attack code☆12Updated 2 years ago
- ☆17Updated last month
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆39Updated last year
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated last year
- ☆218Updated 10 months ago
- ☆22Updated 9 months ago
- source code for USENIX Security paper xNIDS☆40Updated 7 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆67Updated last year
- Code for labeling malicious powershell events in the fiveeyes Darpa OPTC dataset☆11Updated last year
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆32Updated 3 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆31Updated 7 months ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆240Updated 2 months ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆96Updated 5 months ago
- ☆21Updated 7 months ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆135Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆19Updated 4 months ago
- Instructions and tools to use data from engagement 5 of Darpa Transparent Computing Program☆22Updated 3 years ago
- IS416 Final Project. A PoW-based blockchain implementation with attackers trying fork attacks. Language: Go.☆17Updated 3 years ago
- Usenix Security'23☆14Updated 2 years ago
- ☆28Updated last year
- ☆22Updated 5 months ago
- [arXiv'21] Additively Symmetric Homomorphic Encryption for Cross-Silo Federated Learning☆22Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆52Updated 2 months ago
- Academic Papers about LLM Application on Security☆130Updated last month