To generate decoy traffic against WF attack using GAN
☆12Jul 17, 2025Updated 8 months ago
Alternatives and similar repositories for wfd-gan
Users that are interested in wfd-gan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Surakav Implementation☆19May 14, 2024Updated last year
- ☆29May 6, 2021Updated 4 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆14Mar 5, 2026Updated 3 weeks ago
- Codes for WF attacks, defenses☆87Nov 23, 2023Updated 2 years ago
- ☆12Jul 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Reimplementation of the WeFDE information leakage analysis technique for website fingerprinting analysis in Python3.☆23Oct 30, 2020Updated 5 years ago
- This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in …☆55Jun 14, 2024Updated last year
- A Persian POS Tagger with LSTM☆13Jul 19, 2022Updated 3 years ago
- Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with…☆41Jun 13, 2024Updated last year
- ☆11Dec 16, 2021Updated 4 years ago
- ☆19Jun 25, 2025Updated 9 months ago
- Indexing reachability for context-sensitive data flow analysis.☆12Jul 10, 2022Updated 3 years ago
- Java Ranger is a path-merging extension of Symbolic PathFinder☆15Mar 16, 2026Updated last week
- A fuzzer for SMT solvers☆21Aug 22, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PL/SE conference deadline countdowns☆19Nov 23, 2020Updated 5 years ago
- Source code for paper "Real-Time Website Fingerprinting Defense via Traffic Cluster Anonymization", accepted in IEEE Symposium on Securit…☆20Jul 6, 2024Updated last year
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆39Oct 2, 2020Updated 5 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- Lifting network implementation to precise format specification☆23Apr 21, 2025Updated 11 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Jul 29, 2022Updated 3 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆28Feb 21, 2024Updated 2 years ago
- The SJTU-AN21 dataset is an anonymity network dataset generated by ten anonymity services.☆11Apr 14, 2023Updated 2 years ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆11May 28, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- White-box Fairness Testing through Adversarial Sampling☆14Apr 16, 2021Updated 4 years ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- 在cifar10数据集下对resnet-18加入se-net的效果测试☆10May 9, 2019Updated 6 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆28Nov 22, 2023Updated 2 years ago
- ☆11Oct 28, 2023Updated 2 years ago
- ☆20Jun 30, 2019Updated 6 years ago
- My own list of modern GAN tricks I come across☆14Jul 20, 2020Updated 5 years ago
- ☆11Feb 2, 2024Updated 2 years ago
- 训练的模板☆10Oct 10, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Oct 12, 2020Updated 5 years ago
- The official codes for the paper Supervised Anomaly Detection via a Class-Balanced Generative Adversarial Network☆10Sep 7, 2023Updated 2 years ago
- ☆11Aug 10, 2021Updated 4 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- Generate network packets using generative modeling☆15May 17, 2023Updated 2 years ago
- Grammar synthesis algorithm using a black box oracle☆37May 17, 2024Updated last year
- Quic Pluggable Transport for Tor.☆16Feb 23, 2026Updated last month