traffic-analysis / gandalfLinks
☆6Updated 4 years ago
Alternatives and similar repositories for gandalf
Users that are interested in gandalf are comparing it to the libraries listed below
Sorting:
- ☆28Updated last year
- ☆11Updated 3 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Traffic analysis for Tor-based malware detection and classification☆40Updated 2 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- ☆23Updated 6 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- ☆13Updated 3 years ago
- ☆25Updated 3 years ago
- ☆16Updated 3 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Updated 10 months ago
- [AAAI 2023] Official PyTorch implementation for "Untargeted Attack against Federated Recommendation Systems via Poisonous Item Embeddings…☆22Updated 2 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- ☆10Updated 3 years ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆23Updated 11 months ago
- DETOX: A Redundancy-based Framework for Faster and More Robust Gradient Aggregation☆16Updated 5 years ago
- ☆13Updated 3 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆47Updated 2 weeks ago
- Implementation of Adversarial Privacy Graph Embedding in TensorFlow☆20Updated 5 years ago
- Poisoning Deep Learning based Recommender Model in Federated Learning Scenarios☆16Updated 3 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆125Updated 2 years ago
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆23Updated 3 years ago
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆47Updated 6 years ago
- Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation (NDSS'23).☆70Updated 3 months ago
- Code for ML Doctor☆91Updated 11 months ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆18Updated last year
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Updated 8 months ago
- ☆25Updated 8 months ago