kalpatian / information_hidding
☆18Updated 5 years ago
Alternatives and similar repositories for information_hidding:
Users that are interested in information_hidding are comparing it to the libraries listed below
- 武大信息隐藏实验☆18Updated last year
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆14Updated 4 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆29Updated last month
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆29Updated 6 months ago
- Seminar 2022☆22Updated last week
- 全国大学生信息安全竞赛作品收集☆67Updated 6 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆170Updated 2 years ago
- AI Model Security Reading Notes☆35Updated 2 weeks ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆13Updated 8 months ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆55Updated 4 months ago
- paper code☆23Updated 4 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆13Updated 4 years ago
- A curated list of malware-related papers.☆24Updated last year
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆34Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆99Updated 2 years ago
- 从Androzoo下载数据集,区分年份以及良性/恶意应用,支持协程、代理、断点继续、错误重试等☆48Updated last year
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆21Updated 3 years ago
- adversarial malware detection via a principled way☆20Updated last year
- An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malware Detection…☆56Updated last year
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- revised☆21Updated 4 years ago
- ☆16Updated 3 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆27Updated 2 years ago
- A unified framework for AI-enhanced code analysis.☆9Updated last year
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆136Updated last month
- the instructions about request access to AdvDroidZero☆11Updated 11 months ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- 西湖论剑AI大数据安全分析赛 加密恶意流量检测赛道初赛第一名,决赛第二名方案☆20Updated 3 years ago
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆135Updated 2 years ago