BecauseY / Steganography-View external linksLinks
武大信息隐藏实验
☆21May 17, 2023Updated 2 years ago
Alternatives and similar repositories for Steganography-
Users that are interested in Steganography- are comparing it to the libraries listed below
Sorting:
- 数字水印算法(利用matlab实现)☆30Jun 3, 2019Updated 6 years ago
- 基于C语言实现一个简易的Web服务器,支持Http和Https(基于OpenSSL的TLS协议)☆13Sep 20, 2021Updated 4 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- 一个简单的windows的远程控制程序☆13Nov 15, 2017Updated 8 years ago
- Dockerfile to install and run heartbleed tool☆32Jun 16, 2017Updated 8 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆10Jul 11, 2023Updated 2 years ago
- This is a CNN model for prediction of cyber attack, trained using NSL-KDD dataset☆10Mar 7, 2024Updated last year
- All programs and code when I studied Computer Science on UNSA☆10Jan 19, 2023Updated 3 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- 新闻人物言论自动提取---->得到说话的人和说话的内容☆11Jan 17, 2020Updated 6 years ago
- Python Flask Web application with mysql database☆10Apr 24, 2020Updated 5 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆16Feb 19, 2025Updated 11 months ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- Implementation of Prompt-to-Prompt Image Editing with Cross Attention Control☆16Apr 5, 2023Updated 2 years ago
- 大三的大作业。☆11Mar 17, 2016Updated 9 years ago
- These are the codes for paper "Learning to Generate Steganographic Cover for Audio Steganography using GAN"☆15Mar 25, 2021Updated 4 years ago
- From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning - CVPR 2025☆16Mar 24, 2025Updated 10 months ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆14Dec 11, 2022Updated 3 years ago
- ☆18Nov 18, 2019Updated 6 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- Yet Another SetWindowsHookExW Injector☆17Nov 3, 2019Updated 6 years ago
- GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis☆19Dec 6, 2021Updated 4 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆24Nov 16, 2023Updated 2 years ago
- 邮件伪造+批量发送邮件 钓鱼专用☆18Jun 20, 2022Updated 3 years ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- Some test samples for CPG execution logic.☆20Apr 13, 2024Updated last year
- Code Hierarchy Exploration Net (chen)☆25Jan 28, 2026Updated 2 weeks ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆26Apr 22, 2024Updated last year
- ☆20Mar 10, 2022Updated 3 years ago
- A windows userland executable monitor☆23Jul 30, 2020Updated 5 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Using SHAP values as feature selection mechanism☆22May 15, 2022Updated 3 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Dec 11, 2020Updated 5 years ago