rulin-jone / Confidential-LaboratoryView external linksLinks
This project is created for our Confidential Laboratory, which is supported by HEU
☆13Jul 2, 2018Updated 7 years ago
Alternatives and similar repositories for Confidential-Laboratory
Users that are interested in Confidential-Laboratory are comparing it to the libraries listed below
Sorting:
- test tcp congestion fairness on mininet☆10Aug 18, 2020Updated 5 years ago
- ☆11Sep 25, 2024Updated last year
- Python script to split Android boot.img files.☆12Nov 11, 2012Updated 13 years ago
- Smart contract auditing assistant tool for Truffle Framework.☆17Dec 9, 2022Updated 3 years ago
- [ICIP 2021] PyTorch code for "The Mind's Eye: Visualizing Class-Agnostic Features of CNNs" for generation of kernel features.☆12Sep 12, 2021Updated 4 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 3 years ago
- ☆11Nov 27, 2020Updated 5 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- papers about reinforcement learning☆13Jan 4, 2021Updated 5 years ago
- Writeup and exploit for CVE-2024-34740, integer overflow in Android's BinaryXmlSerializer to system_server file write and then to system_…☆51Oct 8, 2025Updated 4 months ago
- ☆13Mar 17, 2022Updated 3 years ago
- DeepAo: Efficient Screen Space Ambient Occlusion Generation via Deep Network☆14Jun 3, 2020Updated 5 years ago
- ☆27May 1, 2025Updated 9 months ago
- 流媒体技术视频教程:RTSP、RTMP、HLS、HTTP、EasyDarwin、live555、ffmpeg、图像识别、智能分析、编解码、流媒体传输、高性能服务器☆15Jun 16, 2016Updated 9 years ago
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 5 years ago
- Pytorch implementation of Deep Generic Representations for Domain-Generalized Anomalous Sound Detection: https://arxiv.org/abs/2409.05035☆23Mar 16, 2025Updated 11 months ago
- Detecting Abnormal Connections of a Network-Flow (KDD-cup 99)☆13Jul 18, 2018Updated 7 years ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- a demo poc for CVE-2024-0015☆18Aug 14, 2024Updated last year
- ☆15May 17, 2019Updated 6 years ago
- Solstice is a security analysis framework for investigative smart contract examination. The first prototype of Solstice, code named W18 (…☆20Jan 13, 2019Updated 7 years ago
- 计算机方向-2021届同学们的2020春季实习面经-持续更新☆65Apr 24, 2020Updated 5 years ago
- DBLP Management System / DBLP 科学文献管理系统☆14Feb 25, 2018Updated 7 years ago
- Spoof a locked bootloader in local attestations (Kotlin fork)☆27Jun 26, 2023Updated 2 years ago
- Virtual Machine Introspection (VMI) project☆15Apr 22, 2015Updated 10 years ago
- Improving Style Transfer With Calibrated Metrics☆16Mar 24, 2020Updated 5 years ago
- Fluency ENhanced Sentence-bert Evaluation (FENSE), metric for audio caption evaluation. And Benchmark dataset AudioCaps-Eval, Clotho-Eval…☆21Feb 1, 2023Updated 3 years ago
- CoNeTTE: An efficient Audio Captioning system leveraging multiple datasets with Task Embedding☆22Dec 17, 2025Updated 2 months ago
- BJTU学硕博士双页模板☆21Jun 23, 2022Updated 3 years ago
- ☆21May 19, 2022Updated 3 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- [ICASSP 2022] Self-Supervised Acoustic Anomaly Detection Via Contrastive Learning☆23Apr 15, 2023Updated 2 years ago
- Baseline for DCASE 2024 Task 9: "Language-Queried Audio Source Separation"☆26Mar 27, 2024Updated last year
- Media Forensics / Fake Detection experiments in PyTorch. Implements Fighting Fake News: Image Splice Detection via Learned Self-Consisten…☆25Sep 19, 2021Updated 4 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Mar 16, 2022Updated 3 years ago
- 利用机器学习检测恶意代码☆20Jul 21, 2016Updated 9 years ago
- running quic on ns3☆23Mar 29, 2023Updated 2 years ago
- orzdba mirror of http://code.taobao.org/svn/orzdba/ Mysql性能检测工具☆26Jul 29, 2016Updated 9 years ago
- learning to protect communications with adversarial neural cryptography☆20Aug 15, 2018Updated 7 years ago