☆20Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for blacklight
Users that are interested in blacklight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Feb 6, 2024Updated 2 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- ☆23Dec 14, 2023Updated 2 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- ☆25Mar 24, 2023Updated 3 years ago
- Official Python SDK for Momento Serverless Cache☆13Feb 5, 2026Updated last month
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆45May 17, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆12Sep 14, 2021Updated 4 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆34Mar 8, 2021Updated 5 years ago
- ☆87Feb 6, 2021Updated 5 years ago
- Dataset and evaluation benchmark for Privacy Leakage Evaluation of Autonomous Web Agents☆36Mar 18, 2026Updated last week
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- ☆26Aug 21, 2024Updated last year
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆15Feb 16, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Official implementation for “SafeMVDrive: Multi-view Safety-Critical Driving Video Synthesis in the Real World Domain”☆22Dec 11, 2025Updated 3 months ago
- ☆133Sep 25, 2025Updated 6 months ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated last year
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- A system that turns jailbreak papers into runnable attacks and benchmarks — live, as research evolves.☆24Mar 12, 2026Updated 2 weeks ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- 移动端渗透测试☆13Aug 7, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18Mar 15, 2025Updated last year
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- ☆47Feb 21, 2020Updated 6 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- ☆22Sep 5, 2025Updated 6 months ago
- ☆14May 30, 2022Updated 3 years ago
- Python library for managing VirtualBox remotely using it's SOAP API☆20Feb 3, 2025Updated last year