IS2Lab / awesome-ai-testing
☆18Updated 11 months ago
Alternatives and similar repositories for awesome-ai-testing
Users that are interested in awesome-ai-testing are comparing it to the libraries listed below
Sorting:
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- ☆28Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last week
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆29Updated 2 years ago
- ☆111Updated 10 months ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆30Updated 3 years ago
- ☆66Updated 4 years ago
- ☆25Updated 4 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆99Updated 2 years ago
- ☆19Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆14Updated last month
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Updated 3 years ago
- Reward Guided Test Generation for Deep Learning☆20Updated 9 months ago
- ☆18Updated 3 years ago
- Library for training globally-robust neural networks.☆28Updated last year
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Updated 2 years ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 4 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆29Updated 3 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 3 years ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆45Updated last month
- ☆47Updated 6 years ago
- ☆46Updated 4 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆26Updated 9 months ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆52Updated 8 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆35Updated 3 weeks ago
- ☆9Updated 2 years ago
- ☆24Updated 4 years ago