IS2Lab / awesome-ai-testing
☆15Updated 9 months ago
Alternatives and similar repositories for awesome-ai-testing:
Users that are interested in awesome-ai-testing are comparing it to the libraries listed below
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- ☆28Updated 2 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆9Updated 8 months ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- ☆9Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆19Updated 4 months ago
- The library for symbolic interval☆21Updated 4 years ago
- ☆103Updated 8 months ago
- Seminar 2022☆22Updated last week
- ☆18Updated last year
- The released code of ReluVal in USENIX Security 2018☆59Updated 5 years ago
- ☆24Updated 3 years ago
- ☆23Updated last month
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- Reward Guided Test Generation for Deep Learning☆20Updated 7 months ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆11Updated 2 years ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 3 years ago
- ☆16Updated 6 months ago
- ☆17Updated 3 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆12Updated last year
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- ☆24Updated 4 years ago
- Concolic Testing for Deep Neural Networks☆118Updated 3 years ago
- Official Implementation of NeurIPS 2024 paper - BiScope: AI-generated Text Detection by Checking Memorization of Preceding Tokens☆13Updated this week
- SampDetox: Black-box Backdoor Defense via Perturbation-based Sample Detoxification☆10Updated last month
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆29Updated last year
- ☆28Updated 5 months ago
- ☆78Updated 11 months ago
- ☆20Updated last year