Bijeeta / credtweakLinks
Password attack and defense using deep neural networks
☆23Updated 3 years ago
Alternatives and similar repositories for credtweak
Users that are interested in credtweak are comparing it to the libraries listed below
Sorting:
- Training and testing of linguistic passwords models.☆27Updated last year
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆17Updated 3 years ago
- Code for cracking passwords with neural networks☆242Updated 6 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆80Updated 2 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆30Updated 7 years ago
- ACM consolidated LaTeX styles☆66Updated 6 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated last year
- A library for adversarial classifier evasion☆43Updated 11 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 3 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆27Updated 4 years ago
- ☆29Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 4 years ago
- ☆20Updated 4 years ago
- Benchmarks for the k-FP WF attack☆32Updated 9 years ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆24Updated 5 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆15Updated 5 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Pytorch implementation of MalConv☆72Updated 3 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆50Updated 4 years ago
- Codes for WF attacks, defenses☆86Updated 2 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆792Updated this week
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆46Updated 3 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆33Updated 7 years ago
- Bad Characters: Imperceptible NLP Attacks☆35Updated last year
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Updated 4 years ago
- A Security Analysis of Honeywords☆15Updated 8 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆14Updated 4 years ago
- ☆22Updated 5 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year