ssloxford / biometric-backdoorsLinks
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆11Updated 3 years ago
Alternatives and similar repositories for biometric-backdoors
Users that are interested in biometric-backdoors are comparing it to the libraries listed below
Sorting:
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆291Updated 11 months ago
- Trojan Attack on Neural Network☆184Updated 3 years ago
- ☆51Updated 2 years ago
- The class resources for the v3 deauther☆21Updated 4 years ago
- A dataset consists of 6,387 ChatGPT prompts from Reddit, Discord, websites, and open-source datasets (including 666 jailbreak prompts).☆12Updated last year
- Wi-Fi Hacking Workshop☆14Updated 4 years ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆14Updated last year
- Evaluation source code for Brokenwire☆31Updated 2 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆294Updated 5 years ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆19Updated 3 years ago
- ECE 209 Security of Embedded Systems Project☆14Updated 7 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- ESP32 Camera Hacking Workshop☆14Updated 5 years ago
- A python script could decode the hackrf one's recived ASK/OOK packets.☆10Updated 10 years ago
- An awesome list of papers on privacy attacks against machine learning☆615Updated last year
- Files and challenges for the OSINT workshop including examples☆22Updated 5 years ago
- Class☆10Updated 4 years ago
- ToolsWatch and Black Hat Arsenal selection of badges☆56Updated 8 months ago
- Research on "Many-Shot Jailbreaking" in Large Language Models (LLMs). It unveils a novel technique capable of bypassing the safety mechan…☆11Updated 11 months ago
- Research, whitepapers, and conference talks.☆15Updated 7 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21Updated 9 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce 35 bit cards☆35Updated 8 years ago
- Sensor data collector for Android devices☆21Updated 6 years ago
- Obfuscate keystroke timings to help protect privacy☆18Updated 8 years ago
- ☆85Updated last year
- Devil-Whisper-Attack☆36Updated 3 months ago
- ☆14Updated 7 years ago
- Inaudible Voice Commands☆106Updated 3 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 3 years ago
- USRP NFC/RFID Project: Eavesdropping on and Emulating MIFARE Ultralight and Classic Cards Using Software-Defined Radio (SDR)☆41Updated 6 years ago