武大信息隐藏实验
☆21May 17, 2023Updated 2 years ago
Alternatives and similar repositories for Steganography-
Users that are interested in Steganography- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆21Nov 23, 2019Updated 6 years ago
- ☆31Jul 23, 2021Updated 4 years ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models☆18Feb 19, 2025Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆11Jul 11, 2023Updated 2 years ago
- Integrating CNN-LSTM Networks with Statistical Filtering Techniques for Optimizing IoT Intrusion Detection☆15Aug 28, 2024Updated last year
- Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO☆17Feb 19, 2025Updated last year
- 编译原理C语言LL1语法分析器的简单实现☆12Aug 31, 2020Updated 5 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆21Nov 30, 2024Updated last year
- Journal Article: Telematics and Informatics Reports☆13Jun 18, 2023Updated 2 years ago
- Image encryption using chaotic maps (Arnold map) ,Mandelbrot set and DNA encryption☆16Feb 14, 2023Updated 3 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- This study proposes a two- level classification technique for the anomaly detection-based IDS architecture for fog-edge sides. Targeted f…☆15Dec 11, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dockerfile to install and run heartbleed tool☆32Jun 16, 2017Updated 8 years ago
- The official implement of the paper 'Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Stegana…☆15Nov 2, 2021Updated 4 years ago
- 异常检测算法☆25Aug 19, 2023Updated 2 years ago
- A 3rd-party implemented Face-Xray for deepfake detection.☆13Jun 2, 2020Updated 5 years ago
- 武汉大学网络安全学院操作系统实践wiki☆19Nov 18, 2021Updated 4 years ago
- person_helmet_count☆15Feb 25, 2021Updated 5 years ago
- 武汉大学操作系统实验 - 复现一个操作系统☆28Jun 18, 2023Updated 2 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- Journal Article: IEEE Access☆21Oct 23, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 新闻言论观点提取☆12Oct 19, 2019Updated 6 years ago
- 一个简单的windows的远程控制程序☆13Nov 15, 2017Updated 8 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- ☆14Jun 11, 2020Updated 5 years ago
- 新闻人物言论自动提取---->得到说话的人和说话的内容☆11Jan 17, 2020Updated 6 years ago
- ☆13Oct 8, 2021Updated 4 years ago
- 基于改进mobilevitv3的微表情识别系统(源码&教程)☆41Dec 2, 2023Updated 2 years ago
- ☆19Sep 8, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- Yet Another SetWindowsHookExW Injector☆17Nov 3, 2019Updated 6 years ago
- Hiding Images in Plain Sight: Deep Steganography☆40Jun 18, 2018Updated 7 years ago
- Explainable & Easy-to-debug Deep Reinforcement Learning Framework☆17Mar 10, 2020Updated 6 years ago
- Implementation of Prompt-to-Prompt Image Editing with Cross Attention Control☆16Apr 5, 2023Updated 3 years ago
- 恶意脚本检测分类工具☆40Jan 26, 2021Updated 5 years ago
- Reproduce the code of papers related to the field of NIDS(network intrusion detection system).入侵检测领域的相关论文复现/适配本地PC后的代码.☆26Apr 30, 2021Updated 5 years ago