zacharykzhao / CA4P-483Links
NLP dataset: Chinese Android Privacy Policy Dataset
☆22Updated 4 months ago
Alternatives and similar repositories for CA4P-483
Users that are interested in CA4P-483 are comparing it to the libraries listed below
Sorting:
- Reproducing state-of-the-art results☆22Updated 2 years ago
- Implementation of DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps☆40Updated 3 years ago
- Automated Storyboard Generation for Android Apps☆34Updated 8 months ago
- This repository holds the code for PolicyLint and PoliCheck, which identifies internal contradictions within privacy policies and analyze…☆58Updated 2 years ago
- Source code of PurPliance analysis tool.☆17Updated last year
- MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps.☆29Updated 7 months ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆223Updated last week
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆50Updated last year
- ☆10Updated last year
- 使用CodeBERT来webshell classfication☆35Updated 3 years ago
- AI Model Security Reading Notes☆39Updated 4 months ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Updated 9 months ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆58Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 5 months ago
- Data Mining for Cybersecurity☆77Updated 3 years ago
- VulDeePecker algorithm implemented in Python☆114Updated 6 years ago
- 复旦白泽大模型安全基准测试集(2024年夏季版)☆41Updated 11 months ago
- ☆46Updated 6 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆88Updated 2 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆210Updated last year
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆124Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆78Updated 5 months ago
- Mobile App Analysis and Testing Literature☆94Updated 2 weeks ago
- Extract call graph from apks using Flowdroid.☆20Updated 5 years ago
- Project FlowCog (2017)☆27Updated 6 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆326Updated 4 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 3 years ago
- ☆22Updated 2 years ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆105Updated 4 years ago