ymirsky / GhostBusters
Ensemble model of experts for detecting fake projected street signs (phantoms)
☆25Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for GhostBusters
- DataCon 9102: DNS Analysis, THU Team 1☆42Updated 5 years ago
- AI安全☆34Updated 3 years ago
- Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 2 years ago
- ☆21Updated 11 months ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆33Updated 3 years ago
- Run-time trojan attack on neural networks☆25Updated 5 years ago
- PaddleSleeve☆77Updated 5 months ago
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- Robustness benchmark for DNN models.☆66Updated 2 years ago
- 企业级安全智能化实践☆69Updated 2 years ago
- ☆14Updated last year
- Devil-Whisper-Attack☆31Updated 4 years ago
- Collection of AI and Security Papers☆27Updated 4 years ago
- Trojan Attack on Neural Network☆180Updated 2 years ago
- The author is lazy, nothing writen.☆28Updated last year
- Deep Puzzling is an AI-based framework for concealing attack intentions and protecting codes, which prevents crackers from obtaining crit…☆63Updated 2 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Updated 5 years ago
- ☆11Updated last year
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- Security-Scenes-Feature-Engineering-Toolkit, Continuous Integration.一款安全数据特征化工具☆59Updated last year
- ☆12Updated 2 years ago
- 2018大学生信息安全国赛pwn出题docker☆25Updated 6 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆74Updated 3 years ago
- ☆13Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- Useful tools for writing shellcode☆66Updated 4 years ago
- VxWorks Fuzzer with AFL and QEMU☆48Updated 4 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year