Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Security and Privacy (S&P) 2024.
☆21Jul 6, 2024Updated last year
Alternatives and similar repositories for Palette
Users that are interested in Palette are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code and dataset for "Subverting Website Fingerprinting Defenses with Robust Traffic Representation".☆67Jan 2, 2024Updated 2 years ago
- ☆27Sep 20, 2023Updated 2 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆166Apr 6, 2026Updated last month
- ☆23Sep 8, 2025Updated 8 months ago
- ☆33Oct 10, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [USENIX Security 2024] Official Repository of 'KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-…☆17Aug 6, 2025Updated 9 months ago
- ☆10Mar 7, 2023Updated 3 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆24May 24, 2025Updated 11 months ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- ☆29Apr 13, 2026Updated 3 weeks ago
- A Persian POS Tagger with LSTM☆13Jul 19, 2022Updated 3 years ago
- ☆11Dec 16, 2021Updated 4 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆30Jan 26, 2025Updated last year
- ☆29May 6, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- To generate decoy traffic against WF attack using GAN☆13Jul 17, 2025Updated 9 months ago
- This repository contains the source code for a network traffic occlusion framework presented at the 2025 IEEE Symposium on Security and P…☆33May 15, 2025Updated 11 months ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated 2 years ago
- CVE-2017-13156-Janus复现☆13Sep 7, 2020Updated 5 years ago
- TSQP: Safeguarding Real-Time Inference for Quantization Neural Networks on Edge Devices (Accepted to S&P 2025)☆17Sep 16, 2025Updated 7 months ago
- 将大容量PCAP按流切分成小PCAP☆25Jun 6, 2023Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- It is a network traffic classifier based on deep learning.☆53Mar 16, 2024Updated 2 years ago
- Materials about Encrypted Traffic Analysis☆355Apr 30, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The source code and dataset are used to demonstrate the DF model, and reproduce the results of the ACM CCS2018 paper☆198Mar 25, 2023Updated 3 years ago
- ☆101Jan 18, 2025Updated last year
- 武汉大学国家网络安全学院2021级操作系统期末大实验☆12Jan 2, 2024Updated 2 years ago
- ☆11Oct 7, 2023Updated 2 years ago
- Doric is a column neural net and progressive neural net library built on pytorch.☆31Jan 16, 2021Updated 5 years ago
- Use the python script to select images contains person in the COCO。☆13May 23, 2021Updated 4 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆57Jun 14, 2024Updated last year
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 4 years ago
- ☆17Jan 19, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 11 months ago
- ☆11Oct 25, 2023Updated 2 years ago
- Code for paper "Membership Inference Attacks Against Vision-Language Models"☆29Jan 25, 2025Updated last year
- ☆12Nov 14, 2024Updated last year
- 基于铜锁密码库开发的商用密码工具箱桌面应用程序☆12Feb 5, 2025Updated last year
- One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning☆57Mar 2, 2024Updated 2 years ago
- ☆40Jan 14, 2025Updated last year