IBM / URETLinks
Universal Robustness Evaluation Toolkit (for Evasion)
☆31Updated 3 weeks ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- ☆66Updated 4 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆71Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆114Updated 10 months ago
- A curated list of academic events on AI Security & Privacy☆152Updated 9 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated 5 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated last year
- ☆22Updated last year
- ☆44Updated 2 years ago
- ☆18Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- LLM security and privacy☆49Updated 7 months ago
- A Python library for Secure and Explainable Machine Learning☆177Updated 4 months ago
- ☆43Updated 8 months ago
- ☆20Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 9 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆49Updated 7 months ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆37Updated 2 weeks ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆87Updated last year
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆77Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆45Updated 2 months ago
- Example TrojAI Submission☆25Updated 6 months ago
- ☆24Updated 2 years ago
- TabularBench: Adversarial robustness benchmark for tabular data☆17Updated 5 months ago
- ☆10Updated 3 years ago
- Code to conduct an embedding attack on LLMs☆25Updated 4 months ago