SajjadAemmi / Image-Processing-Telegram-Bot
Telegram bot using python
☆24Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Image-Processing-Telegram-Bot
- With the use of Recurrent Neural Networks, a model is created and trained to learn to recognize emotions in tweets. The dataset has thous…☆11Updated 3 years ago
- Encryption / Decryption of images with AES-CBC/ECB☆18Updated 3 years ago
- 🙂 Using machine learning techniques and text extraction, we are going to be predicting the sentiment of the text whether it is positive …☆15Updated last year
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆13Updated 3 weeks ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆11Updated 8 months ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆12Updated 3 weeks ago
- ☆15Updated 3 years ago
- ☆16Updated last year
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆35Updated 8 months ago
- Federated Learning for Intrusion Detection System using the Flower framework and UNSW_NB15 dataset.☆11Updated 10 months ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆29Updated 2 weeks ago
- Compare efficiency of steganographic processes LSB,DCT and DWT☆59Updated 4 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆16Updated 4 years ago
- 《信息隐藏技术》第三次大作业——基于图像块分组的加密域可逆信息隐藏(研读文献)☆23Updated 6 years ago
- Simple steganography example of concealing a hidden messages in an image file.☆12Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆134Updated 5 years ago
- 双向身份认证系统☆9Updated 2 years ago
- Simple LSB and DCT. 用Python简单实现LSB和DCT,并用于图像的信息隐藏☆15Updated 4 years ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆50Updated last year
- Steganography applied to conceal small files inside a PNG image.☆18Updated 6 years ago
- IoT intrusion Detection Model based on neural network and random forests☆43Updated 6 years ago
- ☆14Updated 2 years ago
- Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN w…☆38Updated last year
- Source Code of Efficient and Security-Enhanced Certificateless Aggregate Signature-Based Authentication Scheme with Conditional Privacy P…☆10Updated 10 months ago
- Implementation of LSB Steganography technique in Python 3. It also includes a GUI implementation.☆13Updated 4 years ago
- ☆22Updated 5 years ago
- ☆11Updated 2 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆25Updated 2 years ago