lindsey98 / PhishIntention
PhishIntention: Phishing detection through webpage intention
☆76Updated 3 weeks ago
Alternatives and similar repositories for PhishIntention:
Users that are interested in PhishIntention are comparing it to the libraries listed below
- Official Implementation of "Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages" USENIX'21☆277Updated 2 weeks ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆53Updated 3 months ago
- Implementations of 3 phishing detection and identification baselines☆17Updated last month
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆69Updated last year
- Practical Detection of Trojan Neural Networks☆117Updated 4 years ago
- Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.☆58Updated 2 years ago
- [arXiv 2024] An official source code for paper "FlipAttack: Jailbreak LLMs via Flipping".☆86Updated 2 months ago
- Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)☆32Updated 7 months ago
- [ACL 2024] CodeScope: An Execution-based Multilingual Multitask Multidimensional Benchmark for Evaluating LLMs on Code Understanding and …☆97Updated 5 months ago
- ☆74Updated 2 months ago
- windows kernel event log collect☆111Updated last week
- Improved techniques for optimization-based jailbreaking on large language models☆61Updated 7 months ago
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆32Updated 8 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆23Updated 6 months ago
- Code for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack☆20Updated 2 months ago
- Interaction2Code: How Far Are We From Automatic Interactive Webpage Generation?☆27Updated 2 months ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆84Updated 3 months ago
- Source code for "CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature"☆97Updated 2 weeks ago
- Software Security Vulnerability Hub☆61Updated last month
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆15Updated last year
- A benchmark for logging statement generation.☆18Updated 2 months ago
- ☆17Updated 2 months ago
- DongTai API SDK☆43Updated 3 years ago
- Secure Transformer Inference is a protocol for serving Transformer-based models securely.☆89Updated 8 months ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆22Updated 4 years ago
- Code of Journey to the Center of the Knowledge Neurons: Discoveries of Language-Independent Knowledge Neurons and Degenerate Knowledge Ne…☆24Updated 10 months ago
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆47Updated last month
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆9Updated last year
- use sklearn to detect two types of network attacks☆31Updated 5 years ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆35Updated 8 months ago