kalpatian / information_hiddingLinks
☆18Updated 6 years ago
Alternatives and similar repositories for information_hidding
Users that are interested in information_hidding are comparing it to the libraries listed below
Sorting:
- 武大信息隐藏实验☆21Updated 2 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆193Updated 3 years ago
- WHU-武汉大学-国家网络安全 学院-信息安全-密码学实验☆13Updated 4 years ago
- paper code☆28Updated 5 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Updated 8 months ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆87Updated 2 years ago
- PPA attack code☆12Updated 3 years ago
- 2018年全国大学生信息安全竞赛作品赛一等奖☆32Updated 10 months ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Updated 5 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆48Updated 4 months ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆312Updated 5 years ago
- Academic Cooperation Lab☆19Updated 3 months ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆377Updated 2 years ago
- Seminar 2022☆23Updated this week
- ☆28Updated 2 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Updated 4 years ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆85Updated 4 years ago
- ☆223Updated 4 months ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆226Updated 6 years ago
- ☆55Updated 2 years ago
- Source code for paper "How to Backdoor Federated Learning" (https://arxiv.org/abs/1807.00459)☆309Updated last year
- Implementation of the Model Inversion Attack introduced with Model Inversion Attacks that Exploit Confidence Information and Basic Counte…☆84Updated 2 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆63Updated 2 years ago
- Backdoor detection in Federated learning with similarity measurement☆26Updated 3 years ago
- 基于深度学习的恶意软件检测研究;MalConv;☆115Updated 3 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆207Updated 2 months ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆34Updated 2 years ago
- Code for USENIX Security 2023 Paper "Every Vote Counts: Ranking-Based Training of Federated Learning to Resist Poisoning Attacks"☆22Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆61Updated last year
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Updated 4 years ago