A curated collection of the latest academic research papers and developments in AI Security. This repository aims to provide a comprehensive source for researchers and enthusiasts to stay updated on AI Security trends and findings. Contributions welcome!
☆20Mar 23, 2024Updated last year
Alternatives and similar repositories for AI-Security-Research
Users that are interested in AI-Security-Research are comparing it to the libraries listed below
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A Pytorch implementation of SemiMAR: Semi-Supervised Learning for CT Metal Artifact Reduction☆18Mar 2, 2024Updated 2 years ago
- Knowtate is a sophisticated platform designed to elevate your academic research experience. Seamlessly blend reading, note-taking with ma…☆11Sep 19, 2024Updated last year
- ☆11Feb 22, 2022Updated 4 years ago
- ☆11Jan 9, 2026Updated 2 months ago
- Official implementation of Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective☆13Sep 4, 2024Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Create and manage on chain social graphs☆13Sep 4, 2025Updated 6 months ago
- 🔥 A repository for collecting cyberdefense thoughts, books, and documents about AI cyberdefense☆13Jul 2, 2023Updated 2 years ago
- Implementation of BapFL: You can Backdoor Attack Personalized Federated Learning☆15Sep 18, 2023Updated 2 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Sep 6, 2021Updated 4 years ago
- Selective Sampling-based Scalable Sparse Subspace Clustering (NeurIPS 19')☆13Jul 19, 2020Updated 5 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 11 months ago
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- Fine-grained open-world Android app fingerprinting☆15Sep 4, 2022Updated 3 years ago
- This repository contains the code for the paper accepted by IJCAI-2022: Adapt to Adaptation: Learning Personalization for Cross-Silo Fede…☆12Sep 2, 2022Updated 3 years ago
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆18Dec 27, 2022Updated 3 years ago
- All about java memory shell☆15Nov 1, 2022Updated 3 years ago
- It is the implement of paper “Fractional-Order Fusion Model for Low-Light Image Enhancement”☆15Jun 3, 2019Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- A NodeJS Template for a Twitter Bot that Tracks Transactions to Bitcoin Wallets☆20May 7, 2018Updated 7 years ago
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated 3 weeks ago
- ☆18Mar 15, 2024Updated last year
- Data analysis algorithm library☆18Jan 3, 2023Updated 3 years ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 6 months ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- IDOL-Net: An Interactive Dual-Domain Parallel Network for CT Metal Artifact Reduction☆23Sep 28, 2025Updated 5 months ago
- LMAP (large language model mapper) is like NMAP for LLM, is an LLM Vulnerability Scanner and Zero-day Vulnerability Fuzzer.☆28Oct 16, 2024Updated last year
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- Asynchronous Federated Learning☆20Oct 5, 2021Updated 4 years ago
- ☆25May 13, 2025Updated 9 months ago
- ☆23Jan 18, 2024Updated 2 years ago
- 基于污点分析的JSP Webshell检测工具,模拟JVM的栈帧操作进行数据流分析,可以检测出各种变形的JSP Webshell☆21Dec 6, 2021Updated 4 years ago
- [ICML2022] ProgFed: Effective, Communication, and Computation Efficient Federated Learning by Progressive Training☆23Oct 17, 2022Updated 3 years ago
- A summary of the most abbreviations I encountered so far☆28Jan 18, 2026Updated last month
- 🤖🛡️🔍🔒🔑 Tiny package designed to support red teams and penetration testers in exploiting large language model AI solutions.☆26May 16, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆26Dec 14, 2021Updated 4 years ago
- This repository aims to provide links to works about privacy attacks and privacy preservation on graph data with Graph Neural Networks (G…☆23May 25, 2023Updated 2 years ago