ymirsky / GhostBustersLinks
Ensemble model of experts for detecting fake projected street signs (phantoms)
☆25Updated 5 years ago
Alternatives and similar repositories for GhostBusters
Users that are interested in GhostBusters are comparing it to the libraries listed below
Sorting:
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- AI安全☆35Updated 5 years ago
- Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining crit…☆63Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆80Updated 4 years ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆118Updated 4 years ago
- ☆21Updated 5 years ago
- DataCon 9102: DNS Analysis, THU Team 1☆43Updated 6 years ago
- Automated CAN Analyzer☆15Updated 6 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆53Updated 9 months ago
- 每周定期更新论文笔记分享的markdown以及图片☆188Updated 4 years ago
- ☆14Updated 2 years ago
- An awesome & curated list of autonomous driving security papers☆69Updated 2 weeks ago
- Trojan Attack on Neural Network☆191Updated 3 years ago
- 漏洞规则库是一个致力于帮助开发者识别和避免常见安全漏洞的开源项目。我们收集、整理和分析各类编程语言和常用库中的安全漏洞模式,并提供相应的防范措施和最佳实践。☆38Updated 5 months ago
- CCF推荐列表的会议征稿信息(计算机系统相关);SCI I区、II区期刊(系统与安全相关)☆30Updated 6 years ago
- ☆25Updated 3 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227Updated 6 years ago
- Run-time trojan attack on neural networks☆26Updated 6 years ago
- 每日论文推荐☆292Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆48Updated 4 years ago
- 《Web安全之强化学习与GAN》☆225Updated 5 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Updated 4 years ago
- CFG explorer for binaries☆84Updated last year
- Value set analysis(VSA) for revealing the possible values (strings) of the keys from mobile app☆42Updated 5 years ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆74Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57Updated 6 years ago
- PlanFuzz is a novel dynamic testing tool for discovering semantic DoS vulnerability in AD behavioral planning (NDSS 2022)☆22Updated 3 years ago
- Works about detecting vulnerable using ML.☆87Updated 5 years ago