A weak-password checker based on collected malicious passwords
Collecting weak-password from fake-ssh or the other password phisher, and using the thought of the Levinstein Distance and patterns to evaluate its strength and give user alerts.
OpenSSH National Secret Modification Based on OpenSSL (Ongoing Competition Project)
Utilized existing national secret SM series algorithms of OpenSSL to modify OpenSSH services. Acted as a team organizer and contributed significantly to project work and programming tasks. Project Link
Research on Password Security Issues Based on Honeywords (Innovation Project, Ongoing)
Participated in related paper study and other tasks as a team member.
AI Backdoor Simulation Attack Based on Badnets (Course Project, Completed)
Replicated image recognition simulation attacks using methods from the Badnets paper.
AI Voice Synthesis Implementation Based on DDSP-svc (Course Project, Completed)
Configured and applied the DDSP-svc voice synthesis model to understand its principles and achieve voice simulation and synthesis.
Anonymous Electronic Voting Process Implementation Based on Paillier Algorithm (Course Project, Completed)
Implemented the Paillier homomorphic encryption algorithm using Python to simulate an electronic voting system.