Bijeeta / credtweak
Password attack and defense using deep neural networks
☆23Updated 2 years ago
Alternatives and similar repositories for credtweak:
Users that are interested in credtweak are comparing it to the libraries listed below
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 3 years ago
- Training and testing of linguistic passwords models.☆25Updated 4 months ago
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆13Updated 2 years ago
- Code for cracking passwords with neural networks☆229Updated 5 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆13Updated 3 years ago
- 计算机学报的latex模板☆6Updated 2 years ago
- ☆11Updated 9 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Updated 4 years ago
- ☆9Updated 3 years ago
- ☆28Updated 4 years ago
- ACM consolidated LaTeX styles☆65Updated 5 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆75Updated last year
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- ☆11Updated 4 years ago
- ☆24Updated 3 years ago
- ☆22Updated 4 years ago
- Bad Characters: Imperceptible NLP Attacks☆34Updated 9 months ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆25Updated 4 years ago
- Implementations of 3 phishing detection and identification baselines☆17Updated last month
- Code for ACL2018 HotFlip: White-Box Adversarial Examples for Text Classification, Word-level Adversarial Examples☆34Updated 5 years ago
- Natural Universal Trigger Search (NUTS)☆21Updated 3 years ago
- ☆24Updated 2 years ago
- Verifiable Forward Secure SSE scheme☆10Updated 4 years ago
- ☆28Updated last year
- A library for adversarial classifier evasion☆40Updated 10 years ago
- Implementation of "Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model"☆25Updated 3 years ago
- ☆35Updated 4 years ago
- Generate adversarial text via gradient methods☆31Updated 5 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆86Updated 3 years ago