武大信息隐藏实验
☆21May 17, 2023Updated 2 years ago
Alternatives and similar repositories for Steganography-
Users that are interested in Steganography- are comparing it to the libraries listed below
Sorting:
- 数字水印算法(利用matlab实现)☆30Jun 3, 2019Updated 6 years ago
- Embed Data Into a Picture reversibly using difference expansion☆10Dec 20, 2013Updated 12 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆15Sep 11, 2024Updated last year
- 新闻言论观点提取☆12Oct 19, 2019Updated 6 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- All programs and code when I studied Computer Science on UNSA☆10Jan 19, 2023Updated 3 years ago
- Software Artifacts for the paper "TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX"☆19Oct 14, 2024Updated last year
- 新闻人物言论自动提取---->得到说话的人和说话的内容☆11Jan 17, 2020Updated 6 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- ☆12Dec 22, 2023Updated 2 years ago
- ☆14Jun 11, 2020Updated 5 years ago
- 操作系统课程设计,使用c++基于Qt框架开发的任务管理器,ui仿照win10☆11Mar 23, 2020Updated 5 years ago
- This tool set can generate required capabilities for binaries. A system call to capability mapping is used to assign capability to the bi…☆14Oct 26, 2022Updated 3 years ago
- 《机器学习:基于opencv和python的智能图像处理》学习代码☆16Dec 26, 2020Updated 5 years ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Jul 18, 2019Updated 6 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆16May 18, 2022Updated 3 years ago
- 大三的大作业。☆11Mar 17, 2016Updated 9 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Aug 28, 2021Updated 4 years ago
- The source code for the paper "Robust Data Hiding Using Inverse Gradient Attention".☆14Oct 17, 2022Updated 3 years ago
- A 3rd-party implemented Face-Xray for deepfake detection.☆13Jun 2, 2020Updated 5 years ago
- 异常检测算法☆24Aug 19, 2023Updated 2 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆25Nov 16, 2023Updated 2 years ago
- A tool based on python to parse C/C++ code into code property graph☆17Nov 4, 2022Updated 3 years ago
- ☆18Nov 18, 2019Updated 6 years ago
- 邮件伪造+批量发送邮件 钓鱼专用☆18Jun 20, 2022Updated 3 years ago
- ☆19Sep 8, 2025Updated 5 months ago
- Detect x86 shellcode in files and traffic.☆25Jun 12, 2018Updated 7 years ago
- Some test samples for CPG execution logic.☆20Apr 13, 2024Updated last year
- Python library for code analysis with CPG and Joern☆23Jun 23, 2023Updated 2 years ago
- Code Hierarchy Exploration Net (chen)☆27Feb 14, 2026Updated 2 weeks ago
- ☆20Mar 10, 2022Updated 3 years ago
- A windows userland executable monitor☆23Jul 30, 2020Updated 5 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆21Sep 18, 2021Updated 4 years ago
- Using SHAP values as feature selection mechanism☆22May 15, 2022Updated 3 years ago
- ☆31May 28, 2023Updated 2 years ago
- 基于MFC的卡通连连看游戏,数据结构与算法综合实验☆17Sep 4, 2020Updated 5 years ago
- This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Dec 11, 2020Updated 5 years ago
- Root Repo for the RLBox Sandboxing Library Research prototype. Note: this is the original research prototype for this library. For the pr…☆24Sep 14, 2023Updated 2 years ago
- 反射式注入☆29Apr 23, 2019Updated 6 years ago