{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"BRON","owner":"ALFA-group","isFork":false,"description":"\"Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyber Hunting\" by Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly","topicNames":["cwe","capec","threat-data"],"topicsNotShown":0,"allTopics":["cwe","capec","threat-data"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":7,"starsCount":76,"forksCount":23,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-12T20:24:01.139Z"}},{"type":"Public","name":"lipizzaner-gan","owner":"ALFA-group","isFork":false,"description":"[AAAI 2018] \"Towards distributed coevolutionary GANs\" by Abdullah Al-Dujaili, Tom Schmiedlechner, Erik Hemberg, Una-May O'Reilly","topicNames":["distributed-computing","evolutionary-algorithms","gans","coevolutionary","min-max","machine-learning"],"topicsNotShown":0,"allTopics":["distributed-computing","evolutionary-algorithms","gans","coevolutionary","min-max","machine-learning"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":8,"issueCount":5,"starsCount":34,"forksCount":11,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-23T18:39:22.764Z"}},{"type":"Public","name":"STGP-Sharp","owner":"ALFA-group","isFork":false,"description":"A strongly-typed genetic programming implementation in C#","topicNames":["csharp","genetic-programming"],"topicsNotShown":0,"allTopics":["csharp","genetic-programming"],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-22T03:20:52.525Z"}},{"type":"Public","name":"beacons-in-code-comprehension","owner":"ALFA-group","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-06T08:15:23.882Z"}},{"type":"Public","name":"AI4Cyber_Wkshp_LLM_QA_Paper_2023","owner":"ALFA-group","isFork":false,"description":"AI4Cyber KDD Workshop 2023 Code for Assessing LLM QA Paper 2023","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-31T18:01:01.206Z"}},{"type":"Public","name":"ABL-Unity3D","owner":"ALFA-group","isFork":false,"description":"ABL-Unity3D is a GUI-based and efficient Genetic Programming (GP) and AI Planning framework designed for agent-based learning (ABL) research.","topicNames":["gui","simulator","unity","genetic-programming","ai-planning"],"topicsNotShown":0,"allTopics":["gui","simulator","unity","genetic-programming","ai-planning"],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-13T04:41:12.446Z"}},{"type":"Public","name":"RaceInjector-counterexamples","owner":"ALFA-group","isFork":false,"description":"[SOAP 2023, PLDI] Counterexamples generated by RaceInjector","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-13T13:43:43.950Z"}},{"type":"Public","name":"code-representations-ml-brain","owner":"ALFA-group","isFork":false,"description":"[NeurIPS 2022] \"Convergent Representations of Computer Programs in Human and Artificial Neural Networks\" by Shashank Srikant*, Benjamin Lipkin*, Anna A. Ivanova, Evelina Fedorenko, Una-May O'Reilly.","topicNames":["python","programming-languages","representation-learning","language-models","cognitive-neuroscience","fmri-data-analysis","language-understanding"],"topicsNotShown":0,"allTopics":["python","programming-languages","representation-learning","language-models","cognitive-neuroscience","fmri-data-analysis","language-understanding"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-21T13:51:41.984Z"}},{"type":"Public","name":"CLAW-SAT","owner":"ALFA-group","isFork":true,"description":"[SANER 2023] \"CLAWSAT: Towards Both Robust and Accurate Code Models\" by Jinghan Jia*, Shashank Srikant*, Tamara Mitrovska, Chuang Gan, Shiyu Chang, Sijia Liu, Una-May O'Reilly","topicNames":["python","java","ml4code","adversarial-attacks","adversarial-robustness","contrastive-learning","ai4code"],"topicsNotShown":0,"allTopics":["python","java","ml4code","adversarial-attacks","adversarial-robustness","contrastive-learning","ai4code"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-17T21:05:13.388Z"}},{"type":"Public","name":"AI4CyberMLHat_2022","owner":"ALFA-group","isFork":false,"description":"Code for AI4CyberMLHat 2022 workshop paper","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-02T13:13:39.876Z"}},{"type":"Public","name":"ML4Cyber2022","owner":"ALFA-group","isFork":false,"description":"Code used for ML4Cyber2022 publication","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-21T22:43:17.186Z"}},{"type":"Public","name":"adversarial-code-generation","owner":"ALFA-group","isFork":false,"description":"[ICLR 2021] \"Generating Adversarial Computer Programs using Optimized Obfuscations\" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shiyu Chang, Quanfu Fan, Gaoyuan Zhang, and Una-May O'Reilly","topicNames":["seq2seq","program-analysis","combinatorial-optimization","adversarial-machine-learning","ml4code","big-code","differentiable-programming","code2seq","ml4se","ai4code"],"topicsNotShown":0,"allTopics":["seq2seq","program-analysis","combinatorial-optimization","adversarial-machine-learning","ml4code","big-code","differentiable-programming","code2seq","ml4se","ai4code"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":23,"forksCount":5,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-15T02:27:40.932Z"}},{"type":"Public","name":"lipizzaner-web","owner":"ALFA-group","isFork":false,"description":"ALFA web","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-26T09:14:39.141Z"}},{"type":"Public","name":"EEG_coma","owner":"ALFA-group","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"MATLAB","color":"#e16737"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-05-04T21:25:33.497Z"}},{"type":"Public","name":"SNAPT","owner":"ALFA-group","isFork":false,"description":"Simple Network Advanced Persistance Threat (SNAPT) ","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-04-12T14:51:54.544Z"}},{"type":"Public","name":"neural-program-comprehension","owner":"ALFA-group","isFork":false,"description":"[eLife 2020] \"Comprehension of computer code relies primarily on domain-general executive brain regions\" by Anna A. Ivanova, Shashank Srikant, Yotaro Sueoka, Hope H. Kean, Riva Dhamala, Una-May O'Reilly, Marina U. Bers, Evelina Fedorenko","topicNames":["python","programming-languages","fmri","cognitive-neuroscience","language-understanding","scratchjr","language-comprehension"],"topicsNotShown":0,"allTopics":["python","programming-languages","fmri","cognitive-neuroscience","language-understanding","scratchjr","language-comprehension"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-16T13:23:02.112Z"}},{"type":"Public","name":"blackbox-adv-examples-signhunter","owner":"ALFA-group","isFork":true,"description":"A repository for the query-efficient black-box attack, SignHunter","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-15T02:39:37.960Z"}},{"type":"Public","name":"malware_challenge","owner":"ALFA-group","isFork":false,"description":"[AdvML@KDD 2019] Robust Malware Detection Challenge","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":17,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-28T19:30:23.860Z"}},{"type":"Public","name":"CoLAB-Workshop-2019","owner":"ALFA-group","isFork":false,"description":"CoLAB Workshop 2019","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-05-19T09:01:19.478Z"}},{"type":"Public","name":"darkhorseSDN","owner":"ALFA-group","isFork":false,"description":"DarkHorse SDN","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-04-08T13:43:15.478Z"}},{"type":"Public","name":"adv-malware-viz","owner":"ALFA-group","isFork":false,"description":"\"On Visual Hallmarks of Robustness to Adversarial Malware\" by Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly","topicNames":["visualization","malware","adversarial-example","deep-learning"],"topicsNotShown":0,"allTopics":["visualization","malware","adversarial-example","deep-learning"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-31T18:34:22.614Z"}},{"type":"Public","name":"robust-adv-malware-detection","owner":"ALFA-group","isFork":false,"description":"[IEEE S&P Workshop 2018] \"Adversarial Deep Learning for Robust Detection of Binary Encoded Malware\" Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O’Reilly","topicNames":["optimization","malware","cybersecurity","adversarial-networks","adversarial-machine-learning","saddlepoint-approximation","binary-encoded","deep-learning"],"topicsNotShown":0,"allTopics":["optimization","malware","cybersecurity","adversarial-networks","adversarial-machine-learning","saddlepoint-approximation","binary-encoded","deep-learning"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":93,"forksCount":40,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-31T18:33:05.977Z"}},{"type":"Public","name":"reckless-minimax","owner":"ALFA-group","isFork":false,"description":"[LeGO/GOW 2018] \"On the Application of Danskin’s Theorem to Derivative-Free Minimax Optimization\" by Abdullah Al-Dujaili, Shashank Srikant, Erik Hemberg, Una-May O'Reilly","topicNames":["minimax","black-box-optimization"],"topicsNotShown":0,"allTopics":["minimax","black-box-optimization"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-23T14:16:41.441Z"}},{"type":"Public","name":"bayesopt-nash-eq","owner":"ALFA-group","isFork":false,"description":"","topicNames":["game-theory","robust-optimization","black-box-optimization","bayesian-optimization","nash-equilibrium","gp","game-theoretic-algorithms","python","algorithm"],"topicsNotShown":0,"allTopics":["game-theory","robust-optimization","black-box-optimization","bayesian-optimization","nash-equilibrium","gp","game-theoretic-algorithms","python","algorithm"],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-14T12:11:46.301Z"}}],"repositoryCount":24,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}