kalpatian / information_hiddingLinks
☆18Updated 5 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- 武大信息隐藏实验☆17Updated 2 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆13Updated last year
- 使用pytorch实现FGSM☆31Updated 4 years ago
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆58Updated last year
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆185Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆108Updated 3 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆31Updated 5 months ago
- ☆223Updated last month
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆35Updated 4 years ago
- 对抗样本☆273Updated 2 years ago
- PPA attack code☆11Updated 3 years ago
- Codes for WF attacks, defenses☆83Updated last year
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆11Updated 3 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 7 months ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆13Updated last year
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆297Updated 10 months ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- Seminar 2022☆21Updated this week
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆142Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆181Updated last month
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆54Updated last year
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- To generate decoy traffic against WF attack using GAN☆13Updated 2 months ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆20Updated 4 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆222Updated 6 years ago
- Surakav Implementation☆17Updated last year
- paper code☆26Updated 5 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated 2 years ago
- FewShot Malware Classification based on API call sequences, also as code repo for "A Novel Few-Shot Malware Classification Approach for U…☆18Updated 4 years ago