tsmotlp / AI-Security-ResearchLinks
A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehensive source for researchers and enthusiasts to stay updated on AI Security trends and findings. Contributions welcome!
☆18Updated last year
Alternatives and similar repositories for AI-Security-Research
Users that are interested in AI-Security-Research are comparing it to the libraries listed below
Sorting:
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆130Updated last month
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆270Updated 7 months ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Updated 2 years ago
- PPA attack code☆12Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated 10 months ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆212Updated 2 months ago
- ☆24Updated 10 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated 2 years ago
- A curation of awesome papers, datasets and tools about network traffic analysis.☆70Updated 7 months ago
- ☆84Updated last year
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆209Updated last year
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆69Updated last year
- ☆56Updated 5 months ago
- IS416 Final Project. A PoW-based blockchain implementation with attackers trying fork attacks. Language: Go.☆17Updated 3 years ago
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆51Updated last year
- Usenix Security'23☆16Updated 2 years ago
- paper code☆27Updated 4 years ago
- A backdoor attack by vulnerability amplification on online machine learning-based network intrusion detection system☆21Updated 3 years ago
- A curated list of malware-related papers.☆29Updated last year
- Materials about Encrypted Traffic Analysis☆178Updated this week
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆40Updated last year
- Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic☆55Updated 5 months ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- AI Model Security Reading Notes☆38Updated 3 months ago
- ☆223Updated last year
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆17Updated 11 months ago
- ☆109Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 4 months ago