IS2Lab / awesome-ai-testingLinks
☆18Updated last year
Alternatives and similar repositories for awesome-ai-testing
Users that are interested in awesome-ai-testing are comparing it to the libraries listed below
Sorting:
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆114Updated 10 months ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆99Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- ☆66Updated 4 years ago
- [ICLR 2021] "Generating Adversarial Computer Programs using Optimized Obfuscations" by Shashank Srikant, Sijia Liu, Tamara Mitrovska, Shi…☆30Updated 3 years ago
- Code for the AAAI 2023 paper "CodeAttack: Code-based Adversarial Attacks for Pre-Trained Programming Language Models☆30Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 3 weeks ago
- Code release for DeepJudge (S&P'22)☆51Updated 2 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- ☆28Updated 2 years ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆14Updated 2 months ago
- Library for training globally-robust neural networks.☆28Updated last year
- ☆47Updated 4 years ago
- ☆17Updated 2 years ago
- Reward Guided Test Generation for Deep Learning☆20Updated 10 months ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- ☆9Updated 4 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 3 years ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 4 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆71Updated last year
- ☆11Updated 5 years ago
- ☆19Updated last year
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆36Updated 2 weeks ago
- ☆144Updated 7 months ago
- ☆9Updated 2 years ago
- Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers☆52Updated 9 months ago
- The library for symbolic interval☆21Updated 4 years ago