gchers / fbleauLinks
A tool for estimating a system's information leakage via Machine Learning
☆10Updated last year
Alternatives and similar repositories for fbleau
Users that are interested in fbleau are comparing it to the libraries listed below
Sorting:
- Deadline countdowns for academic conferences in Security and Privacy☆762Updated this week
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated last year
- A single script to facilitate submitting papers to ArXiv.org☆18Updated 7 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆181Updated last month
- Teaching materials related to the Tamarin Prover☆70Updated last year
- XPIR: Private Information Retrieval for Everyone☆119Updated 3 years ago
- Artifact of PrivAnalyzer as described in the Usenix 2022 paper "PrivGuard: Privacy Regulation Compliance Made Easier"☆13Updated 3 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆351Updated 4 years ago
- Differential Privacy Testing System☆22Updated 5 years ago
- The Scyther Tool for the symbolic analysis of security protocols☆104Updated last month
- ☆38Updated 3 years ago
- A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps☆67Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Updated 5 years ago
- Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware☆166Updated 2 years ago
- A set of exercises for getting started with the Tamarin prover☆20Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆122Updated 5 months ago
- Main source code repository of the Tamarin prover for security protocol verification.☆477Updated this week
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- ☆55Updated 5 years ago
- Automatic Feature Generation for Website Fingerprinting☆30Updated 8 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- CaPC is a method that enables collaborating parties to improve their own local heterogeneous machine learning models in a setting where b…☆26Updated 3 years ago
- Some algorithms for computation on encrypted data based on Microsoft SEAL☆28Updated 5 years ago
- IoT Reading List (IoT research papers from 2016 to 2019)☆85Updated 6 years ago
- ☆22Updated last year
- ☆44Updated 4 years ago
- ☆21Updated 2 years ago
- A implementation of Privacy Buckets: A numerical tool to calculate privacy loss☆10Updated 3 years ago