kalpatian / information_hiddingLinks
☆18Updated 5 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- 武大信息隐藏实验☆18Updated 2 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆34Updated 3 years ago
- PPA attack code☆12Updated 2 years ago
- AI Model Security Reading Notes☆38Updated 3 months ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 4 months ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆138Updated 2 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆13Updated 4 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆57Updated 7 months ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆30Updated 2 months ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆115Updated 2 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆12Updated 9 months ago
- The code for our Updates-Leak paper☆16Updated 4 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 5 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆30Updated 7 years ago
- Reversible Data Hiding in Color Image With Grayscale Invariance☆34Updated last year
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 2 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆13Updated 4 years ago
- ☆16Updated 4 years ago
- paper code☆27Updated 4 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- Seminar 2022☆21Updated 3 months ago
- 数字水印算法(利用matlab实现)☆29Updated 6 years ago
- Separable Reversible Data Hiding in Encrypted JPEG Bitstream☆12Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆154Updated this week
- 🦄Python 实现LSB算法进行信息隐藏 包含空域与变换域 JPEG信息隐藏算法 对PDF文件进行信息隐藏 基于卷积神经网络的隐写分析 Matlab SRM、SCA隐写分析☆151Updated 5 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆19Updated 4 years ago
- A curated list of malware-related papers.☆28Updated last year