Bijeeta / credtweak
Password attack and defense using deep neural networks
☆23Updated 2 years ago
Alternatives and similar repositories for credtweak:
Users that are interested in credtweak are comparing it to the libraries listed below
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆14Updated 2 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- Training and testing of linguistic passwords models.☆25Updated 8 months ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- ☆9Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- Deadline countdowns for academic conferences in Security and Privacy☆704Updated this week
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- CyberAttack Sensing and Information Extraction☆71Updated 4 months ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- ☆27Updated 4 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆78Updated last year
- Open-source code for RFCNLP paper.☆57Updated 2 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆32Updated 6 years ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- Detecting software vulnerability described public security reports with minimal training examples☆13Updated 3 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆33Updated 3 years ago
- [arXiv'18] Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks☆20Updated 5 years ago
- Code and data of the ACL 2020 paper "Word-level Textual Adversarial Attacking as Combinatorial Optimization"☆88Updated 4 years ago
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆12Updated last month
- ☆12Updated 6 years ago
- Generating Natural Language Adversarial Examples through Probability Weighted Word Saliency☆69Updated 2 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 3 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆142Updated 2 months ago
- Source code to simulate WTF-PAD on a set of web traffic traces.☆22Updated 4 years ago
- Codes for WF attacks, defenses☆82Updated last year
- Large-Scale Sequence Mining with Hierarchies☆14Updated 10 years ago
- Code for EMNLP2020 long paper: BERT-Attack: Adversarial Attack Against BERT Using BERT☆196Updated 4 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆11Updated 2 years ago