zhang's repositories
2017QUT_S7comm
SCADA network attack datasets and process logs
Adv-attack-and-defense-on-driving-model
Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"
Cloud-Information-Accountability-
CLOUD INFORMATION ACCOUNTABILITY is an implementation of IEEE research journals Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage, Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Senior Member, IEEE, Mengyang Yu and MR-PDP: Multiple-Replica Provable Data Possession,Reza Curtmola, Reza Curtmola, Osama Khan, Randal Burns, Giuseppe Ateniese
conpot
ICS/SCADA honeypot
DataPoisoning_FL
Code for Data Poisoning Attacks Against Federated Learning Systems
federated-learning
Everything about Federated Learning (papers, tutorials, etc.) -- 联邦学习
federated-learning-1
A distributed fedrated learning system on the blockchain.
federated-learning-secure-aggregation
A simple Python implementation of a secure aggregation protocole for federated learning.
ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
ICS_PCAPS
ICS Cybersecurity PCAP respository
lstm-anomaly-detect
Example code for neural-network-based anomaly detection of time-series data (uses LSTM)
ML-NIDS-for-SCADA
In this work, we aim at developing a NIDS (Network Intrusion Detection System) that detects attacks targeting SCADA systems, in a concrete industrial used case scenario.
ModelPoisoning
Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470
Packet-Explorer
A small script for applying protocol differential analysis to a communication stream.
Paper-Implementation-Public-Integrity-Auditing-IIIMT
This repository involves implementation of research paper Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation by Tao Jiang, Xiaofeng Chen, and Jianfeng Ma
PDP
Provable data possession - simple version
poisoning-benchmark
A unified benchmark problem for data poisoning attacks
RAID-FlexDPDP
A project in C++ that intends to adapt the idea of verifying data integrity using DPDP in the scenario of a RAID system
SPDP
Scalable and Efficient Provable Data Possession implementation
telemanom
A framework for using LSTMs to detect anomalies in multivariate time series data. Includes spacecraft anomaly data and experiments from the Mars Science Laboratory and SMAP missions.
TRISIS-TRITON-HATMAN
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware