IBM / URETLinks
Universal Robustness Evaluation Toolkit (for Evasion)
☆31Updated 2 months ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- A Python library for Secure and Explainable Machine Learning☆190Updated 5 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆221Updated 2 weeks ago
- A curated list of academic events on AI Security & Privacy☆166Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆83Updated 2 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- ☆149Updated last year
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆100Updated last year
- Whispers in the Machine: Confidentiality in Agentic Systems☆41Updated 3 weeks ago
- ☆25Updated 4 years ago
- ☆124Updated last year
- Risks and targets for assessing LLMs & LLM vulnerabilities☆33Updated last year
- ☆19Updated 4 years ago
- ☆44Updated 2 years ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆63Updated last year
- Privacy Testing for Deep Learning☆209Updated 2 months ago
- This repository provides a benchmark for prompt injection attacks and defenses☆346Updated last month
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆357Updated last month
- ☆54Updated last year
- ☆68Updated 5 years ago
- Trojan Attack on Neural Network☆189Updated 3 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Updated 3 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆53Updated 8 months ago
- ☆129Updated 3 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆82Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- Code for ML Doctor☆91Updated last year