RobertoFalconi / BlackBoxAttackDNNView external linksLinks
Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.
☆16Jan 13, 2026Updated last month
Alternatives and similar repositories for BlackBoxAttackDNN
Users that are interested in BlackBoxAttackDNN are comparing it to the libraries listed below
Sorting:
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Mar 20, 2019Updated 6 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- ☆16Aug 21, 2020Updated 5 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆69Mar 19, 2018Updated 7 years ago
- ☆34Mar 28, 2022Updated 3 years ago
- A python library for self-supervised learning☆12Nov 17, 2025Updated 2 months ago
- ☆12Dec 22, 2025Updated last month
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Solution for dominating set problem using improved quantum algorithm Grover, which uses Schoning algorithm for k-SAT problem to accomplis…☆16Aug 19, 2022Updated 3 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- A python client for the idigbio v2 API☆11Dec 11, 2020Updated 5 years ago
- ☆10Sep 25, 2019Updated 6 years ago
- Python implementation for the project titled "Optimization problems in vehicle route network design" developed at IIIT Delhi as part of m…☆13Dec 8, 2022Updated 3 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆41Dec 7, 2020Updated 5 years ago
- Digisynthetic Digisyn Link3 AES67 Controller repo☆15Jan 20, 2026Updated 3 weeks ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 3 weeks ago
- Developer focused AI Gateway☆15Mar 7, 2025Updated 11 months ago
- Files and libraries belonging to the getting started guide "Serial communication with the freeDSP"☆10Apr 14, 2016Updated 9 years ago
- Dataset Generator for Musical Devices☆17Dec 2, 2025Updated 2 months ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- Exercises from the Audio Programming book.☆11Jan 14, 2015Updated 11 years ago
- Files from the 1st Juce tutorial. Available here: https://audioordeal.co.uk/how-to-build-a-vst-lesson-1-intro-to-juce/☆10Apr 22, 2019Updated 6 years ago
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 6 years ago
- ☆14Nov 15, 2017Updated 8 years ago
- This repository contains the code for all figures in the paper "General Pitfalls of Model-agnostic Interpretation Methods for Machine Lea…☆15Aug 17, 2021Updated 4 years ago
- Proxy a single incomming TCP connection to multiple remote TCP servers☆13Apr 24, 2016Updated 9 years ago
- An environment based on JSBSIM aimed at one-to-one close air combat.☆12May 15, 2023Updated 2 years ago
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- [NeurIPS 2024] Advancing Training Efficiency of Deep Spiking Neural Networks through Rate-based Backpropagation☆19Jan 16, 2025Updated last year