kalpatian / information_hiddingLinks
☆18Updated 5 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- 武大信息隐藏实验☆17Updated 2 years ago
- PPA attack code☆12Updated 2 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆178Updated 2 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆103Updated 3 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆31Updated 3 months ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆11Updated 2 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆295Updated 5 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆216Updated 6 years ago
- paper code☆27Updated 4 years ago
- 基于LSB隐写术将文本隐藏于320x240的灰度图像☆20Updated 5 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Updated 3 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 4 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆30Updated 7 years ago
- AI Model Security Reading Notes☆39Updated 4 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆83Updated 2 years ago
- 全国大学生信息安全竞赛作品收集☆70Updated 6 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆139Updated 2 years ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆21Updated 4 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 8 months ago
- 使用pytorch实现FGSM☆30Updated 3 years ago
- 对抗样本☆267Updated 2 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆35Updated 3 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- ☆13Updated 6 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆161Updated 3 weeks ago
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆168Updated 5 years ago