Pro-GNNImplementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+96.12%)
SimP-GCNImplementation of the WSDM 2021 paper "Node Similarity Preserving Graph Convolutional Networks"
Stars: ✭ 43 (-58.25%)
DiagnoseRESource code and dataset for the CCKS201 paper "On Robustness and Bias Analysis of BERT-based Relation Extraction"
Stars: ✭ 23 (-77.67%)
PracticalMachineLearningA collection of ML related stuff including notebooks, codes and a curated list of various useful resources such as books and softwares. Almost everything mentioned here is free (as speech not free food) or open-source.
Stars: ✭ 60 (-41.75%)
s-attack[CVPR 2022] S-attack library. Official implementation of two papers "Vehicle trajectory prediction works, but not everywhere" and "Are socially-aware trajectory prediction models really socially-aware?".
Stars: ✭ 51 (-50.49%)
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-58.25%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+2461.17%)
perceptual-advexCode and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".
Stars: ✭ 44 (-57.28%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-20.39%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+0%)
square-attackSquare Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]
Stars: ✭ 89 (-13.59%)
T3[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-75.73%)
pathpypathpy is an OpenSource python package for the modeling and analysis of pathways and temporal networks using higher-order and multi-order graphical models
Stars: ✭ 124 (+20.39%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+502.91%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+37.86%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+300.97%)
POPQORNAn Algorithm to Quantify Robustness of Recurrent Neural Networks
Stars: ✭ 44 (-57.28%)
cloudrasp-log4j2一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+1.94%)
bookworm📚 social networks from novels
Stars: ✭ 72 (-30.1%)
ECG analysisNo description or website provided.
Stars: ✭ 32 (-68.93%)
Python-For-Ethical-HackingThis is a complete project series on implementing hacking tools available in Kali Linux into python.
Stars: ✭ 29 (-71.84%)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-54.37%)
hard-label-attackNatural Language Attacks in a Hard Label Black Box Setting.
Stars: ✭ 26 (-74.76%)
trojanzooTrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Stars: ✭ 178 (+72.82%)
chopCHOP: An optimization library based on PyTorch, with applications to adversarial examples and structured neural network training.
Stars: ✭ 68 (-33.98%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+11.65%)
scan-cli-pluginDocker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+31.07%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-75.73%)
covid-xprizeOpen-source repository containing examples and documentation for the Cognizant XPRIZE Pandemic Response Challenge
Stars: ✭ 36 (-65.05%)
advisoriesA collection of my public security advisories.
Stars: ✭ 16 (-84.47%)
modelscriptREPO MOVED TO https://github.com/repetere/jsonstack-data - Data Science and Machine learning in JavaScript
Stars: ✭ 40 (-61.17%)
multiscorerA module for allowing the use of multiple metric functions in scikit's cross_val_score
Stars: ✭ 21 (-79.61%)
hh researchАвтоматизация поиска и исследования вакансий с сайта hh.ru (Headhunter) с помощью методов Python. Классификация данных, поиск статистических параметров.
Stars: ✭ 36 (-65.05%)
PGD-pytorchA pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"
Stars: ✭ 83 (-19.42%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-66.99%)
TokenBreakerJSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-50.49%)
gamechangerGAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 27 (-73.79%)
BigCLAM-ApacheSparkOverlapping community detection in Large-Scale Networks using BigCLAM model build on Apache Spark
Stars: ✭ 40 (-61.17%)
autoindexPHP - Automatically add an "index.php" in all directories recursively
Stars: ✭ 25 (-75.73%)
DUNCode for "Depth Uncertainty in Neural Networks" (https://arxiv.org/abs/2006.08437)
Stars: ✭ 65 (-36.89%)
heidiheidi : tidy data in Haskell
Stars: ✭ 24 (-76.7%)
gosquitogosquito ("go" + "mosquito") is a pluggable tool for data gathering, data processing and data transmitting to various destinations.
Stars: ✭ 25 (-75.73%)
AWPCodes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"
Stars: ✭ 114 (+10.68%)
KitanaQAKitanaQA: Adversarial training and data augmentation for neural question-answering models
Stars: ✭ 58 (-43.69%)
non-api-fb-scraperScrape public FaceBook posts from any group or user into a .csv file without needing to register for any API access
Stars: ✭ 40 (-61.17%)
cumulusCumulus is web application weakness monitoring, it would be working by add just 3 codelines
Stars: ✭ 43 (-58.25%)