Universal Robustness Evaluation Toolkit (for Evasion)
☆32Sep 17, 2025Updated 6 months ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- TabularBench: Adversarial robustness benchmark for tabular data☆19Oct 15, 2025Updated 5 months ago
- Example external repository for interacting with armory.☆11May 2, 2022Updated 3 years ago
- Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"☆31Apr 15, 2025Updated 11 months ago
- ☆37Sep 30, 2024Updated last year
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- Codebase for Obfuscated Activations Bypass LLM Latent-Space Defenses☆30Feb 11, 2025Updated last year
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- Hardened Extension of the Adversarial Robustness Toolbox (HEART) supports assessment of adversarial AI vulnerabilities in Test & Evaluati…☆15Sep 18, 2025Updated 6 months ago
- Professional Wargaming LLM Toolbox☆21Jul 9, 2025Updated 8 months ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Official code implementation of "MAD: A Military Audio Dataset for Situational Awareness and Surveillance"☆15Nov 26, 2025Updated 3 months ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- Codes and Datasets for our SIGIR 2021 Paper: "Understanding the Role of Affect Dimensions in Detecting Emotions from Tweets: A Multi-task…☆12Apr 21, 2021Updated 4 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆84Sep 1, 2025Updated 6 months ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- Official Implementation of NeurIPS'23 Paper "Cross-Episodic Curriculum for Transformer Agents"☆31Oct 12, 2023Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Attention-guided CNN for image denoising(Neural Networks,2020)☆11Jan 17, 2020Updated 6 years ago
- [CVPR 2023] "TrojViT: Trojan Insertion in Vision Transformers" by Mengxin Zheng, Qian Lou, Lei Jiang☆14Jan 5, 2024Updated 2 years ago
- Can Large Language Models Solve Security Challenges? We test LLMs' ability to interact and break out of shell environments using the Over…☆13Aug 21, 2023Updated 2 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- A dataset for natural language code search.☆14Feb 13, 2020Updated 6 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- Adversarial Malware Generator Using GANs☆54Jul 25, 2024Updated last year
- ☆18Mar 30, 2025Updated 11 months ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- ☆13Sep 28, 2024Updated last year
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Learning from what we know: How to perform vulnerability prediction using noisy historical data, Empirical Software Engineering (EMSE)☆14Sep 20, 2023Updated 2 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Mar 19, 2020Updated 6 years ago
- Tool, paper, and study data for DeepManeuver: Adversarial Test Generation for Trajectory Manipulation of Autonomous Vehicles.☆11Aug 26, 2023Updated 2 years ago
- Official repository of paper "Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval"☆10Dec 20, 2023Updated 2 years ago