kalpatian / information_hiddingLinks
☆18Updated 6 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- 武大信息隐藏实验☆21Updated 2 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 10 months ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆193Updated 3 years ago
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- paper code☆28Updated 5 years ago
- ☆42Updated 4 months ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Updated 5 years ago
- PPA attack code☆12Updated 3 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Updated 8 months ago
- AI Model Security Reading Notes☆43Updated 9 months ago
- ☆32Updated 7 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆34Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆312Updated 5 years ago
- Codes for WF attacks, defenses☆86Updated 2 years ago
- ☆19Updated 3 years ago
- Seminar 2022☆23Updated this week
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆57Updated 2 years ago
- ☆223Updated 4 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆87Updated 2 years ago
- Academic Cooperation Lab☆19Updated 3 months ago
- SOCI is a Secure Outsourced Computation on Integers based on the Paillier cryptosystem and a twin-server architecture☆102Updated 2 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Updated 4 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆48Updated 4 months ago
- 主题为”基于GAN的恶意软件对抗样本生成“。首先介绍了恶意软件发展现状,引出基于模式匹配、特征空间和问题空间三种方式去检测恶意软件。然后介绍了如何生成对抗样本攻击恶意软件检测器,详细介绍了基于GAN的恶意软件对抗样本的MalGAN框架,并对实验结果进行了对比。最后总结了结构…☆36Updated 4 years ago
- edu-yinzhaoxia / Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-CodingThis code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding…☆29Updated 5 years ago
- The Algorithmic Foundations of Differential Pivacy by Cynthia Dwork Chinese Translation☆171Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆115Updated 3 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Updated 3 years ago
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆11Updated 3 years ago