FeatureScatterFeature Scattering Adversarial Training
Stars: ✭ 64 (+88.24%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+141.18%)
structural-imbalanceDemo for analyzing the structural imbalance on a signed social network.
Stars: ✭ 22 (-35.29%)
PortforgeLightweight utility to fool port scanners
Stars: ✭ 23 (-32.35%)
In0riDefacement detection with deep learning
Stars: ✭ 35 (+2.94%)
adaptAwesome Domain Adaptation Python Toolbox
Stars: ✭ 46 (+35.29%)
gamechangerGAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 27 (-20.59%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (+85.29%)
satellite-placementGroup satellites into constellations such that their average observation coverage is maximized
Stars: ✭ 20 (-41.18%)
danDemo code for the paper ''Distributional Adversarial Networks''
Stars: ✭ 18 (-47.06%)
Digital-Image-WatermarkingDigital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC
Stars: ✭ 37 (+8.82%)
nemesystGeneralised and highly customisable, hybrid-parallelism, database based, deep learning framework.
Stars: ✭ 17 (-50%)
AttentionganAttentionGAN for Unpaired Image-to-Image Translation & Multi-Domain Image-to-Image Translation
Stars: ✭ 341 (+902.94%)
shellsumA defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-11.76%)
Inverse rlAdversarial Imitation Via Variational Inverse Reinforcement Learning
Stars: ✭ 79 (+132.35%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+202.94%)
PerceptualGANPytorch implementation of Image Manipulation with Perceptual Discriminators paper
Stars: ✭ 119 (+250%)
cloudrasp-log4j2一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+208.82%)
Electra中文 预训练 ELECTRA 模型: 基于对抗学习 pretrain Chinese Model
Stars: ✭ 132 (+288.24%)
SWELFSimple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-32.35%)
Blocklist Ipsetsipsets dynamically updated with firehol's update-ipsets.sh script
Stars: ✭ 2,011 (+5814.71%)
AdversarialnetspapersAwesome paper list with code about generative adversarial nets
Stars: ✭ 6,219 (+18191.18%)
tensorflow-mnist-AAETensorflow implementation of adversarial auto-encoder for MNIST
Stars: ✭ 86 (+152.94%)
FawkesFawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Stars: ✭ 4,362 (+12729.41%)
EANN-KDD18EANN: event-adversarial neural networks for multi-modal fake news detection
Stars: ✭ 171 (+402.94%)
Personal Security Checklist🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+6923.53%)
TorchadverA PyTorch Toolbox for creating adversarial examples that fool neural networks.
Stars: ✭ 88 (+158.82%)
gamechanger-dataGAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 17 (-50%)
Show Adapt And TellCode for "Show, Adapt and Tell: Adversarial Training of Cross-domain Image Captioner" in ICCV 2017
Stars: ✭ 146 (+329.41%)
BTPS-SecPackThis repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (-2.94%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+238.24%)
ManMultinomial Adversarial Networks for Multi-Domain Text Classification (NAACL 2018)
Stars: ✭ 72 (+111.76%)
ICGan-tensorflowThe code of "Invertible conditional GANs for image editing" in tensorflow
Stars: ✭ 17 (-50%)
advrankAdversarial Ranking Attack and Defense, ECCV, 2020.
Stars: ✭ 19 (-44.12%)
AdversarialAudioSeparationCode accompanying the paper "Semi-supervised adversarial audio source separation applied to singing voice extraction"
Stars: ✭ 70 (+105.88%)
Pro-GNNImplementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+494.12%)
Delving Deep Into GansGenerative Adversarial Networks (GANs) resources sorted by citations
Stars: ✭ 834 (+2352.94%)
headersAn application to catch, search and analyze HTTP secure headers.
Stars: ✭ 59 (+73.53%)
StudyAdversarialsSome of my experiments targeting adversarial instances
Stars: ✭ 12 (-64.71%)
Raven-StormRaven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+591.18%)
ChromaganOfficial Implementation of ChromaGAN: An Adversarial Approach for Picture Colorization
Stars: ✭ 117 (+244.12%)
AntiBotLightweight BungeeCord plugin that aims to stop attacks on your server quickly and efficiently.
Stars: ✭ 42 (+23.53%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+7658.82%)
Adversarial video generationA TensorFlow Implementation of "Deep Multi-Scale Video Prediction Beyond Mean Square Error" by Mathieu, Couprie & LeCun.
Stars: ✭ 662 (+1847.06%)
alldaydevops-aismAll Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)
Stars: ✭ 21 (-38.24%)
All About The GanAll About the GANs(Generative Adversarial Networks) - Summarized lists for GAN
Stars: ✭ 630 (+1752.94%)