zhliuworks / SJTU-Report-miniLinks
SJTU 中文简约 LaTeX 报告模板
☆10Updated 4 years ago
Alternatives and similar repositories for SJTU-Report-mini
Users that are interested in SJTU-Report-mini are comparing it to the libraries listed below
Sorting:
- 🌟 Notes and codes for Linux Kernel (SJTU-CS353)☆25Updated 3 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆17Updated 8 months ago
- ☆75Updated 2 years ago
- THU 编译原理课实验 -- 删减版 C 语言编译器(report 中思考题部分有错误)☆1Updated 3 years ago
- Distributed Graph Filesystem☆9Updated 3 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆17Updated 2 weeks ago
- a data collection of related work: Toward Understanding Deep Learning Framework Bugs☆15Updated last year
- Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG (ISSTA 2025)☆22Updated last week
- ☆92Updated 3 years ago
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆12Updated this week
- a simple script to detect word by word plagiarism for https://plagiarism.iu.edu/certificationTests/☆17Updated last year
- 上海交通大学开题报告LaTeX模板(非官方) Shanghai Jiao Tong University LaTeX Template for thesis proposal (unofficial)☆93Updated 6 months ago
- 新燕园人的私人班车助手(非官方)。☆56Updated 3 months ago
- Seminar 2022☆21Updated 2 months ago
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆20Updated 10 months ago
- Collect simple coverage information in memory.☆11Updated 2 years ago
- Official Code for ACL 2024 paper "GradSafe: Detecting Unsafe Prompts for LLMs via Safety-Critical Gradient Analysis"☆56Updated 7 months ago
- Focused on the safety and security of Embodied AI☆42Updated last week
- Artifact for ESEC/FSE'23 paper "NeuRI: Diversifying DNN Generation via Inductive Rule Inference"☆31Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆29Updated this week
- ☆24Updated 7 months ago
- ☆24Updated 4 months ago
- 🛡 A curated list of adversarial attacks in PyTorch, with a focus on transferable black-box attacks.☆55Updated this week
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆78Updated 2 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆26Updated 9 months ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆37Updated 7 months ago
- Simulator.☆103Updated last month
- Academic Papers about LLM Application on Security☆135Updated 4 months ago
- ☆30Updated 6 months ago
- https://csstipendrankings.org☆208Updated last month