ssloxford / biometric-backdoors
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
☆10Updated 3 years ago
Alternatives and similar repositories for biometric-backdoors:
Users that are interested in biometric-backdoors are comparing it to the libraries listed below
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- Trojan Attack on Neural Network☆183Updated 3 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆38Updated 4 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆290Updated 7 months ago
- ☆84Updated last year
- Devil-Whisper-Attack☆32Updated 4 years ago
- GSExtract is a tool for converting imperfect satellite radio captures of internet traffic transmitted using Generic Stream Encapsulation …☆71Updated 4 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆36Updated 4 years ago
- StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors, NDSS 2023☆20Updated 2 years ago
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆26Updated 6 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆280Updated 5 years ago
- A LoRaWAN Security Evaluation Framework☆39Updated last year
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 3 years ago
- Common python and scapy scripts for Wi-Fi☆63Updated last week
- benzyne is a data-hiding library written in pure PHP, intended for hiding data on any Windows machine.☆10Updated 3 years ago
- USB testing framework☆15Updated last year
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆213Updated 5 years ago
- Watermarking against model extraction attacks in MLaaS. ACM MM 2021.☆33Updated 3 years ago
- A Python library for Secure and Explainable Machine Learning☆172Updated 2 months ago
- CveXplore☆36Updated last week
- ☆36Updated 5 years ago
- Code and datasets for the paper entitled "Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devices".☆34Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41Updated 9 months ago
- Official implementation of the USENIX Security 2024 paper ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks.☆13Updated last year
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆33Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 4 years ago
- ☆16Updated 8 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆23Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆102Updated 5 years ago