kalpatian / information_hiddingLinks
☆18Updated 5 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- WHU-武汉大学-国家网络安全学院-信息安全-密码学实验☆13Updated 4 years ago
- 武大信息隐藏实验☆17Updated 2 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆184Updated 2 years ago
- Official code of the paper "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning".☆14Updated last year
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 7 months ago
- 使用pytorch实现FGSM☆31Updated 4 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆84Updated 3 years ago
- Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks☆31Updated 5 months ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆299Updated 5 years ago
- paper code☆26Updated 4 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆84Updated 2 years ago
- 机器学习安全相关论文、代码☆42Updated 6 years ago
- ☆18Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆179Updated last month
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆20Updated 4 years ago
- adversarial malware detection via a principled way☆22Updated 2 years ago
- 一个基于Netfilter、Netlink的Linux传输层状态检测防火墙,支持NAT,仅用于学习与交流(华中科技大学2021学年网络安全课程设计项目)☆58Updated last year
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Updated 7 years ago
- ☆11Updated last year
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆148Updated 4 months ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 4 years ago
- ☆223Updated last month
- ☆30Updated 7 years ago
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆85Updated 2 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆42Updated last week
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆58Updated 10 months ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Updated 4 years ago
- ☆25Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆44Updated 10 months ago