TYWZ-milk / Orange_OS
自制Orange操作系统
☆19Updated 7 years ago
Alternatives and similar repositories for Orange_OS:
Users that are interested in Orange_OS are comparing it to the libraries listed below
- 武汉大学网络安全学院操作系统实践wiki☆19Updated 3 years ago
- WHU-武汉大学-操作系统概念-课程资料与习题解答☆26Updated 4 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆14Updated 4 years ago
- ☆20Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated last year
- ☆18Updated 5 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆33Updated 5 months ago
- 哈工大2018秋计算机系统安全实验☆17Updated 6 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 3 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆170Updated 2 years ago
- 《信息隐藏技术》第三次大作业——基于图像块分组的加密域可逆信息隐藏(研读文献)☆25Updated 7 years ago
- ☆24Updated 4 years ago
- ☆18Updated 3 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆55Updated 5 months ago
- [TDSC 2024] Official code for our paper "FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model"☆15Updated 3 months ago
- 基于倒排索引和向量空间模型的信息检索系统☆14Updated 3 years ago
- 武大信息隐藏实验☆18Updated last year
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆42Updated 2 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆12Updated 4 years ago
- 考研保研机试☆45Updated 5 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆29Updated 2 months ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆17Updated 4 months ago
- This is the official implementation of our paper 'Black-box Dataset Ownership Verification via Backdoor Watermarking'.☆25Updated last year
- Watermarking LLM papers up-to-date☆13Updated last year
- ☆26Updated 3 years ago
- ☆21Updated 4 years ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆28Updated 6 months ago