Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.
☆16Jan 13, 2026Updated 3 months ago
Alternatives and similar repositories for BlackBoxAttackDNN
Users that are interested in BlackBoxAttackDNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Mar 20, 2019Updated 7 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- ☆16Aug 21, 2020Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 3 months ago
- A fault injection framework for spiking neural networks☆10Mar 20, 2026Updated last month
- Metrics for spiking neural networks based on torchmetrics☆13Mar 27, 2023Updated 3 years ago
- Implementation of Direct Preference Optimization☆17Jul 17, 2023Updated 2 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- ☆10Jan 22, 2020Updated 6 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- NeMo - A hardware agnostic neuromorphic processor simulation model built on ROSS☆14Aug 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PyTorch Implemetations of Adversarial Examples☆19Jun 25, 2018Updated 7 years ago
- ☆34Mar 28, 2022Updated 4 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- The code of paper: Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing (CVPR 2024))☆19Mar 12, 2024Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- codes of the paper Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks (CVPR 2023)☆16Aug 19, 2024Updated last year
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Run-time trojan attack on neural networks☆25Feb 8, 2019Updated 7 years ago
- Adaptive learning platform for physics concept built on ChatGPT knowledge.☆12May 7, 2025Updated 11 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tiny node js-based program to listen on 80 port and will log all requests and also send logs to Telegram Bot.☆12May 16, 2021Updated 4 years ago
- The ML_Attack_XOR_PUF is a Machine Learning-based model for attacking the XOR Physical Unclonable Functions using a small number of chall…☆20Oct 30, 2020Updated 5 years ago
- A python library for self-supervised learning☆12Nov 17, 2025Updated 5 months ago
- Source code and scripts for the paper "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks"☆20Dec 10, 2024Updated last year
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆34Jul 2, 2025Updated 10 months ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 7 years ago
- This is the implementation of our paper 'Open-sourced Dataset Protection via Backdoor Watermarking', accepted by the NeurIPS Workshop on …☆23Oct 13, 2021Updated 4 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated this week
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [Neurips 2025] Max-Former.☆60Jan 19, 2026Updated 3 months ago
- ☆14Jul 13, 2022Updated 3 years ago
- Investigating the generalization behavior of LM probes trained to predict truth labels: (1) from one annotator to another, and (2) from e…☆30May 23, 2024Updated last year
- ☆10Mar 13, 2023Updated 3 years ago
- Code for Active Mixup in 2020 CVPR☆23Jan 11, 2022Updated 4 years ago
- Solution for dominating set problem using improved quantum algorithm Grover, which uses Schoning algorithm for k-SAT problem to accomplis…☆16Aug 19, 2022Updated 3 years ago
- Reinforcement learning framework for spiking neural network actors with R-STDP for the master's thesis "Training Spiking Neural Networks …☆21May 26, 2022Updated 3 years ago