Automatic Feature Generation for Website Fingerprinting
☆30Apr 30, 2017Updated 9 years ago
Alternatives and similar repositories for website-fingerprinting
Users that are interested in website-fingerprinting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of "Website Fingerprinting at Internet Scale"☆24Feb 24, 2023Updated 3 years ago
- Code for the paper "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019)☆51Nov 13, 2020Updated 5 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Jun 17, 2024Updated last year
- Benchmarks for the k-FP WF attack☆33Aug 24, 2016Updated 9 years ago
- A Tor Browser crawler based on selenium and phantomjs, used for work on Website Fingerprinting (WFP) Attacks.☆11Aug 25, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Contains python tools for performing website fingerprinting classification as well as fetching web-pages.☆13Aug 27, 2022Updated 3 years ago
- ☆19Oct 11, 2021Updated 4 years ago
- The source code and dataset are used to demonstrate the TF model, and reproduce the results of the ACM CCS2019 paper☆55Dec 31, 2021Updated 4 years ago
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆25Jul 14, 2020Updated 5 years ago
- A single script to facilitate submitting papers to ArXiv.org☆18Apr 14, 2018Updated 8 years ago
- ☆13Feb 21, 2022Updated 4 years ago
- Examples from Eric Vétillard's tutorial re-arranged in a Gradle project☆30Aug 25, 2021Updated 4 years ago
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆24Oct 30, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Sep 20, 2019Updated 6 years ago
- Ethereum Identity Research for MSc Thesis at Trinity College Dublin☆10May 17, 2017Updated 9 years ago
- ☆43Sep 29, 2021Updated 4 years ago
- A general-purpose privacy-preserving Analytics platform!☆10Mar 27, 2019Updated 7 years ago
- A sample applet on how to deploy traditional Diffie-Hellman on JavaCard.☆11Feb 21, 2016Updated 10 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 5 years ago
- The official PyTorch implementation for ICCV'21 Oral paper 'Artificial GAN Fingerprints: Rooting Deepfake Attribution in Training Data'☆78Apr 16, 2023Updated 3 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 9 years ago
- ☆14Sep 23, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Self-attentive deep learning method for online traffic classification and its interpretability (CN21 & NetAI20)☆40Jun 27, 2024Updated last year
- A powerful traffic generator that can model complex behaviors using Markov models and an action-dependency graph.☆42Dec 31, 2023Updated 2 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated last year
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆10Apr 17, 2024Updated 2 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated last year
- ☆13May 15, 2022Updated 4 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- ☆13Jan 10, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Turing Beamer templates for presentations☆14Dec 2, 2025Updated 5 months ago
- ☆130May 3, 2023Updated 3 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Simple password-wallet application based on Intel SGX for linux.☆17May 2, 2020Updated 6 years ago
- Watermark for Image Generators☆20Aug 10, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- PoC of Swift for Compute@Edge☆12Feb 3, 2022Updated 4 years ago