ymirsky / GhostBustersLinks
Ensemble model of experts for detecting fake projected street signs (phantoms)
☆25Updated 5 years ago
Alternatives and similar repositories for GhostBusters
Users that are interested in GhostBusters are comparing it to the libraries listed below
Sorting:
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining crit…☆63Updated 4 years ago
- Trojan Attack on Neural Network☆191Updated 3 years ago
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆23Updated 2 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Updated 4 years ago
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- AI安全☆35Updated 5 years ago
- 每周定期更新论文笔记分享的markdown以及图片☆188Updated 4 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Updated 4 years ago
- ☆21Updated 5 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Useful tools for writing shellcode☆69Updated 5 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- Write-ups about challenges in https://pwnable.tw. Transferred from https://github.com/DoubleLabyrinth/pwnable.tw☆23Updated 7 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227Updated 6 years ago
- Courseware for computer system security course at HIT☆251Updated last year
- All ctf challs and scripts (and writeup, maybe) from 0ops.☆150Updated 2 years ago
- ☆14Updated last year
- Yet another CTF Platform☆22Updated 9 years ago
- 全国大学生信息安全竞赛作品收集☆71Updated 7 years ago
- ☆11Updated 2 years ago
- ☆42Updated 6 years ago
- ☆19Updated 6 years ago
- CFG explorer for binaries☆84Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆109Updated 7 years ago