212 skills found · Page 7 of 8
Chenkehan21 / Adversarial Attack RLsome algorithms about adversarial attack in rl
git-disl / GTAttackPodDeep neural networks (DNNs) have demonstrated impressive performance on many challenging machine learning tasks. However, DNNs are vulnerable to adversarial inputs generated by adding maliciously crafted perturbations to the benign inputs. As a growing number of attacks have been reported to generate adversarial inputs of varying sophistication, the defense-attack arms race has been accelerated. This project collects state-of-the-art attack algorithms and organizes them with a easy-to-use interface.
ds2-lab / Aca DlisAlgorithmic complexity attacks for dynamic learned indexes (VLDB'24)
gagan3012 / DomainGANPaper Implementation of DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers
Gaurav-2001 / Machine Learning And Cyber SecurityUsing Kmean cluster algorithm to stop the DOS attack and making the webserver Secure
nitinvbharti / SWAT Data Attack PredictionUsing SWAT(Secure water treatment testbed) data to predict when the system is under attack. We are using 6 known types of attacks to apply machine learning algorithm
eytanlvy / Aes IntegralThis project implements the Advanced Encryption Standard (AES) algorithm in Python and demonstrates an integral cryptanalysis attack on a 4-round version of AES-128.
rootFaheem / An Enhanced Certificate Less Algorithm For Wireless Sensor Network ReactReact implementation of ECAWSN protocol. Authentication of Sensor nodes is a major security issues in WSN. Lack of authentication yields security attacks like man in middle attack, wormhole attack etc. One of the way of achieving authentication is the use of Digital Signature. Certificateless Signature scheme is an important key parameter for improving the performance of WSN. However, the energy constraints in WSN demands Certificateless Authentication schemes. The proposed scheme is more efficient by eliminating the need of certificate authority centers. The simulation result of proposed algorithm and technique can approximately achieve 6-15% reduction of energy dissipation and provide secured transmission using certificate-less algorithm.
SaijyotiTripathy / Heart Attack Analysis And PredictionTo explain and identify the problem and resolve medical objectives, different data science techniques, which interpret the medical goals, have been implemented to diagnose heart disease. A suitable machine learning algorithm called Logistic Regression is preferred for the training and implementation in python for developing and evolving the predictive model. This algorithm executed on the model will help medical experts to predict and diagnose heart attacks in the patient dataset. Exploratory Data Analysis is performed using python libraries such as Matplotlib and Seaborn to visualize the correlation between features.
rahulreddythummala / A Secure And Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data• Here, a secure multi-keyword ranked search scheme over encrypted cloud data is presented using JAVA as the frontend technology and backend as MySQL.• Specifically, the vector space model and the widely-used “term frequency (TF) × inverse document frequency(IDF)” model are combined in the index construction and query generation to provide multi-keyword ranked search.• We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. • The secure kNN algorithm is utilized to encrypt the index and query vectors, and to ensure accurate relevance score calculation between encrypted index and query vectors. • To resist different attacks in different threat models, we construct two secure search schemes: the basic dynamic multi-keyword ranked search (BDMRS) scheme in the known ciphertext model, and the enhanced dynamic multi-keyword ranked search (EDMRS) scheme in the known background model.
GauravVermaji / Whale Optimizer For Partitoned HWSNThe problem of network partition in ad-hoc networks received attention in the recent years. Many solutions have been proposed such as algorithms based, heuristics based, approximations based and meta-heuristic based to place additional relay nodes in partitioned heterogeneous wireless sensor networks to resume its operation. However, placing additional relay nodes in the partitioned network is shown an NP-Hard problem, because locations for relay node placements are not known in advance. Meta-heuristics are proven best-suited solutions to solve such kind of NP-Hard problem as well as optimization problem due to their problem independent and stochastic nature. In this research paper, we have introduced a network partition problem and developed a new nature inspired solution called Whale Optimizer to Repair Partitioned Heterogeneous wireless sensor networks (WORPH) based on the social behaviour of whales in the nature. In the proposed solution, a whale tries to find the optimal locations for attacking its prey. We have mimicked the said behaviour of whales in our proposed solution while considering the initial locations of deployed RNs inside disjoint partitions. The observed optimal positions are being used to find the optimal locations for deploying new RNs in such a way that partitioned network is restored in an optimal way. The simulation results are observed and compared with state-of-the-art approaches to prove the effectiveness of our proposed solution.
liorsidi / Adversarial DGA DatasetsA collection of different adversarial attacks on Domain Generated Algorithms' (DGA) classifiers
ThalesGroup / ScoopImplementation of the Scoop algorithm for profiling attacks against higher-order masking
bbthorne / Attack GraphsRepresentation of Attack Graphs aided by networkx along with an example algorithm to run on one.
zokevlar98 / Cyber Range Infra AutomationThe project aims to automate the development of computerized algorithms for attack simulations and cybersecurity defense exercises. Using DevOps tools, it enables test environments and custom applications designed for cybersecurity training environments.
mingdegit / Adv LPAdversarial attack on MINIST and license plate by FGSM, BIM and Deepfool algorithm.
ludiosarchive / Securetypessecuredict implementation, a dict that uses secure hashing to stop algorithmic complexity attacks
aayushsingh8217 / DDoS MLA machine learning project for classifying Distributed Denial of Service (DDoS) attacks, leveraging algorithms like Random Forest, Logistic Regression, and Neural Network.
ML-Security-Research-LAB / Deep TROJOfficial Implementation of Deep-TROJ: An Inference Stage Trojan Insertion Algorithm through Efficient Weight Replacement Attack (CVPR 2024)
srivastava-amisha / SCARSCAR: Power Side-Channel Analysis at RTL Level : using graph neural networks to detect locations vulnerable to power side-channel attacks in the RTL design for cryptographic algorithms.