Waldenth / WHU-Cryptography-experimentLinks
WHU-武汉大学-国家网络安全学院-信息安全-密码学实验
☆13Updated 4 years ago
Alternatives and similar repositories for WHU-Cryptography-experiment
Users that are interested in WHU-Cryptography-experiment are comparing it to the libraries listed below
Sorting:
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆130Updated last month
- WHU-武汉大学-操作系统概念-课程资料与习题解答☆27Updated 4 years ago
- 全国大学生信息安全竞赛作品赛 非官方 LaTex 论文模板☆25Updated last year
- 武大网安院课程资料☆13Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 4 months ago
- 信息安全数学基础-陈恭亮-WHU教案习题解答☆51Updated 4 years ago
- ☆20Updated 3 years ago
- ☆15Updated 6 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆38Updated 7 months ago
- PPA attack code☆12Updated 2 years ago
- 武汉大学网络安全学院操作系统实践wiki☆18Updated 3 years ago
- 华中科技大学2021网络安全课程设计(基于netfilter的状态检测防火墙)☆50Updated 3 years ago
- ☆18Updated 5 years ago
- ☆223Updated last year
- 武汉大学国家网安院软件安全☆10Updated 6 months ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆30Updated 2 months ago
- 武汉大学本科生毕业设计(论文)LaTeX 模板,2025 网安院版☆29Updated last month
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆175Updated 2 years ago
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆61Updated last year
- source code for USENIX Security paper xNIDS☆43Updated 10 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated 2 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- 网络安全程序设计相关实验-基于OpenSSL的安全聊天系统☆9Updated 2 years ago
- ☆24Updated 10 months ago
- 18级武汉大学国家网络安全学院暑期实训备份☆11Updated 5 years ago
- This repository compiles a list of papers related to intellectual property (IP) protection for deep learning models.☆13Updated 4 months ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆18Updated 9 months ago
- This is the source code for MEA-Defender. Our paper is accepted by the IEEE Symposium on Security and Privacy (S&P) 2024.☆23Updated last year
- 2022年华中科技大学网络空间安全学院《网络安全课程设计》☆21Updated 6 months ago