Bijeeta / credtweak
Password attack and defense using deep neural networks
☆23Updated 2 years ago
Alternatives and similar repositories for credtweak:
Users that are interested in credtweak are comparing it to the libraries listed below
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆14Updated 2 years ago
- Training and testing of linguistic passwords models.☆25Updated 7 months ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆13Updated 3 years ago
- Code for cracking passwords with neural networks☆231Updated 5 years ago
- Monte Carlo password checking☆11Updated 7 years ago
- ☆27Updated 3 years ago
- Python version of the OMEN password cracker☆14Updated 3 months ago
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆27Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- A framework for password-strength evaluation☆14Updated 4 years ago
- FANCI is a prototype implementation of a machine learning based classification engine for non-existent domains to detect domain gernation…☆29Updated 6 years ago
- Bad Characters: Imperceptible NLP Attacks☆34Updated 11 months ago
- A library for adversarial classifier evasion☆41Updated 10 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated last year
- ACM consolidated LaTeX styles☆66Updated 5 years ago
- Code for the paper: "Adversarial Examples for Models of Code"☆17Updated 4 years ago
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆32Updated 6 years ago
- ☆27Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆136Updated last month
- ☆8Updated 2 years ago
- Secure Linear Regression in the Semi-Honest Two-Party Setting.☆39Updated 5 years ago
- ☆28Updated last year
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆17Updated 9 years ago
- Secure Aggregation for Federated Learning with Malicious Actors☆24Updated 2 years ago
- SecMML (Queqiao): Secure MPC (multi-party computation) Machine Learning Framework.☆112Updated last year
- 计算机学报的latex模板☆7Updated 2 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago