TYWZ-milk / Orange_OS
自制Orange操作系统
☆19Updated 6 years ago
Related projects: ⓘ
- 武汉大学网络安全学院操作系统实践wiki☆13Updated 2 years ago
- ☆14Updated this week
- WHU-武汉大学-操作系统概念-课程资料与习题解答☆23Updated 3 years ago
- ☆10Updated 2 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆14Updated 3 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆24Updated 4 years ago
- 哈工大2018秋计算机系统安全实验☆17Updated 5 years ago
- ☆20Updated 2 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆141Updated last year
- ☆11Updated 4 years ago
- 基于倒排索引和向量空间模型的信息检索系统☆10Updated 3 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆27Updated 11 months ago
- Hidden backdoor attack on NLP systems☆45Updated 2 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆15Updated 3 years ago
- ☆18Updated 4 years ago
- 考研保研机试☆45Updated 4 years ago
- ☆20Updated last year
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆18Updated 3 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆29Updated 6 months ago
- A prototype of information retrieval system inclduing the document parsing, index construction, query parsing to support the vector space…☆15Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆85Updated 2 years ago
- 武大信息隐藏实验☆18Updated last year
- Code and data of the ACL-IJCNLP 2021 paper "Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger"☆37Updated 2 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆29Updated 3 years ago
- ☆16Updated 2 years ago
- 算法笔记☆11Updated 3 years ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆13Updated 10 months ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆16Updated last year
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆89Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆47Updated 4 years ago