user163 / image-encryptionLinks
Encryption / Decryption of images with AES-CBC/ECB
☆18Updated 4 years ago
Alternatives and similar repositories for image-encryption
Users that are interested in image-encryption are comparing it to the libraries listed below
Sorting:
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- SEED Labs developed in the last 20 years.☆855Updated 3 weeks ago
- A Python framework for creating emulation of the Internet.☆253Updated this week
- ☆24Updated 2 years ago
- ☆21Updated 4 years ago
- Source code for my books☆163Updated 2 years ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆105Updated 4 months ago
- Jinzhao Attest provides unified attestation workflow for TEE compatibility, usability and security.☆35Updated last year
- SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems☆16Updated last year
- ☆36Updated 2 years ago
- seed security labs 总结与记录☆42Updated last year
- 2018年全国大学生信息安全竞赛作品赛一等奖☆31Updated 6 months ago
- Data Mining for Cybersecurity☆78Updated 3 years ago
- Contextualizing System Calls in Containers for Anomaly-Based Intrusion Detection - CCSW'22☆22Updated 2 years ago
- 关于五篇基于区块链的物联网安全相关论文的学习笔记和心得☆27Updated 4 years ago
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- A curated list of Security Big4 papers for Privacy, Mobile Security and Access Control.☆14Updated 10 months ago
- Practical and Efficient in-TEE Verification of Privacy Compliance☆46Updated 7 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆167Updated last month
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆10Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆20Updated 11 months ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆71Updated last year
- ☆10Updated 4 years ago
- ☆32Updated 3 years ago
- 该资源为恶意代码检测相关的论文或文章总结,包括作者撰写的恶意代码与机器学习、深度学习相关博客,希望对您有所帮助~☆15Updated 5 years ago
- A collection of security papers on top-tier publications☆51Updated 2 weeks ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆20Updated 2 years ago
- My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP request…☆23Updated last year
- Records & Reports for Seed-project☆95Updated 4 years ago
- Contains SEED Labs solutions from Computer Security course by Kevin Du.☆122Updated 5 years ago