ymirsky / GhostBustersLinks
Ensemble model of experts for detecting fake projected street signs (phantoms)
☆25Updated 4 years ago
Alternatives and similar repositories for GhostBusters
Users that are interested in GhostBusters are comparing it to the libraries listed below
Sorting:
- Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining crit…☆62Updated 3 years ago
- An awesome & curated list of autonomous driving security papers☆45Updated last month
- ☆20Updated 4 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆35Updated 4 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆79Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- AI安全☆35Updated 4 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆185Updated 4 years ago
- Robustness benchmark for DNN models.☆67Updated 3 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Updated 4 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆51Updated 7 years ago
- Reward Guided Test Generation for Deep Learning☆20Updated last year
- CFG explorer for binaries☆82Updated 9 months ago
- VxWorks Fuzzer with AFL and QEMU☆48Updated 5 years ago
- ☆11Updated 2 years ago
- This repository is used to store recording about papers and presentations readed.☆17Updated last year
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆43Updated 5 years ago
- Stealthy Attacks against Robotic Vehicles. Please read the following paper before trying out the attacks.☆14Updated 2 years ago
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- Write-ups about challenges in https://pwnable.tw. Transferred from https://github.com/DoubleLabyrinth/pwnable.tw☆24Updated 6 years ago
- Courseware for computer system security course at HIT☆251Updated last year
- PlanFuzz is a novel dynamic testing tool for discovering semantic DoS vulnerability in AD behavioral planning (NDSS 2022)☆23Updated 3 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆58Updated 6 years ago
- The scalable bug search for binaries☆69Updated 8 years ago
- Automated CAN Analyzer☆15Updated 5 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆14Updated 2 months ago
- ☆55Updated 5 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- The released code of FuzzGuard in USENIX Security 2020.☆31Updated 5 years ago