traffic-analysis / gandalfLinks
☆6Updated 4 years ago
Alternatives and similar repositories for gandalf
Users that are interested in gandalf are comparing it to the libraries listed below
Sorting:
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆40Updated last year
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆52Updated last year
- Code for ML Doctor☆91Updated 10 months ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆124Updated 2 years ago
- ☆25Updated last year
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆22Updated 4 years ago
- ☆32Updated 3 years ago
- ☆25Updated 3 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature Attribution…☆11Updated 10 months ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆26Updated 3 years ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆23Updated 10 months ago
- ☆26Updated 4 years ago
- The multi-tab website fingerprinting attack library contains real-world multi-tab Tor traffic and code for multi-tab website fingerprinti…☆26Updated 5 months ago
- ☆23Updated 2 years ago
- Backdoor Stuff in AI/ ML domain☆27Updated this week
- ☆11Updated 3 years ago
- ☆66Updated 4 years ago
- Implementation of the paper "Minipatch: Undermining DNN-based Website Fingerprinting with Adversarial Patches" which is published in IEEE…☆11Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆20Updated last year
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 4 years ago
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆48Updated 3 years ago
- ☆17Updated 3 years ago
- ☆85Updated last year
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆47Updated 6 years ago
- ☆10Updated 3 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆30Updated last year
- Source code for 'Lemna: Explaining deep learning based security applications'.☆23Updated 5 years ago