IS2Lab / awesome-ai-testingLinks
☆20Updated last year
Alternatives and similar repositories for awesome-ai-testing
Users that are interested in awesome-ai-testing are comparing it to the libraries listed below
Sorting:
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- ☆28Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 4 years ago
- ☆19Updated last year
- ☆18Updated 4 years ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- ☆122Updated last year
- ☆66Updated 5 years ago
- ☆25Updated 3 years ago
- Library for training globally-robust neural networks.☆29Updated 2 months ago
- ☆25Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆44Updated 4 months ago
- ☆27Updated 5 years ago
- The library for symbolic interval☆21Updated 5 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆13Updated 2 weeks ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- 🔮Reasoning for Safer Code Generation; 🥇Winner Solution of Amazon Nova AI Challenge 2025☆27Updated last month
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- ☆148Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆26Updated 4 years ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆45Updated 2 months ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆78Updated last year
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆30Updated 3 years ago
- Adversarial Robustness for Code☆16Updated 4 years ago