Huiying-Li / blacklightView external linksLinks
☆19Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for blacklight
Users that are interested in blacklight are comparing it to the libraries listed below
Sorting:
- ☆14Jul 11, 2019Updated 6 years ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆20Aug 15, 2022Updated 3 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆21Sep 8, 2021Updated 4 years ago
- ☆88Feb 6, 2021Updated 5 years ago
- This repository represents the official implementation of the mmHPE.☆12Oct 12, 2024Updated last year
- ☆128Sep 25, 2025Updated 4 months ago
- ☆12Nov 30, 2018Updated 7 years ago
- Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks (IEEE S&P 2024)☆34Jun 29, 2025Updated 7 months ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 5 years ago
- Extracts static code features from opencl kernels to be used for machine learning.☆10Apr 30, 2021Updated 4 years ago
- Character Motion Style Transfer☆11Nov 7, 2018Updated 7 years ago
- BBO optimiser☆11Feb 11, 2020Updated 6 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- ☆10Jun 24, 2021Updated 4 years ago
- [NeurIPS 2024] Efficiency for Free: Ideal Data Are Transportable Representations☆19Jan 19, 2025Updated last year
- Official implementation for “SafeMVDrive: Multi-view Safety-Critical Driving Video Synthesis in the Real World Domain”☆20Dec 11, 2025Updated 2 months ago
- Code and data for "Impact of Evaluation Methodologies on Code Summarization" in ACL 2022.☆10Sep 6, 2022Updated 3 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- Deadline countdowns for academic conferences relevant to the SSE chair.☆12Updated this week
- ☆13Feb 14, 2022Updated 3 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- ☆13Mar 9, 2025Updated 11 months ago
- The official codes for our paper at COLING 2022: Semantic-Preserving Adversarial Code Comprehension☆12Oct 23, 2022Updated 3 years ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆15Jul 9, 2025Updated 7 months ago
- This repository contains the dataset of the paper ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks☆12Apr 28, 2023Updated 2 years ago
- ☆10May 14, 2023Updated 2 years ago
- This repository contains the replication package of our paper "Assessing the Security of GitHub Copilot’s Generated Code - A Targeted Rep…☆10Nov 16, 2023Updated 2 years ago
- ☆47Feb 21, 2020Updated 5 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- Code and dataset for EMNLP 2022 Findings paper "Benchmarking Language Models for Code Syntax Understanding"☆16Oct 24, 2022Updated 3 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- ☆13Apr 26, 2023Updated 2 years ago