TYWZ-milk / Orange_OSLinks
自制Orange操作系统
☆18Updated 7 years ago
Alternatives and similar repositories for Orange_OS
Users that are interested in Orange_OS are comparing it to the libraries listed below
Sorting:
- WHU-武汉大学-操作系统概念-课程资料与习题解答☆27Updated 4 years ago
- 武汉大学网络安全学院操作系统实践wiki☆18Updated 3 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆181Updated 2 years ago
- 中国科学院大学研究生课程资料☆81Updated 2 years ago
- 哈工大2018秋计算机系统安全实验☆17Updated 6 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆12Updated last year
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- ☆20Updated 3 years ago
- ☆11Updated 5 years ago
- 对抗样本☆268Updated 2 years ago
- 一些保研资源☆21Updated 6 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆40Updated 9 months ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- ☆223Updated last week
- 《信息隐藏技术》第三次大作业——基于图像块分组的加密域可逆信息隐藏(研读文献)☆26Updated 7 years ago
- 使用pytorch实现FGSM☆31Updated 4 years ago
- An open-source toolkit for textual backdoor attack and defense (NeurIPS 2022 D&B, Spotlight)☆189Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆97Updated 3 years ago
- ☆18Updated 5 years ago
- 复现了下Neural Cleanse这篇论文,真的是简 单而有效,发在了okaland☆30Updated 4 years ago
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 4 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 6 months ago
- ☆24Updated 2 years ago
- Code and data for our paper "Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark"…☆49Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 9 months ago
- 华中科技大学计算机视觉实验,基于卷积神经网络的手写数字识别,和快速梯度下降法(FGSM)的攻击以及基于对抗训练的防御。☆13Updated 2 years ago
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆12Updated 2 months ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- 基于倒排索引和向量空间模型的信息检索系统☆14Updated 4 years ago
- ☆20Updated 3 years ago