USSLab / PoltergeistAttackLinks
☆25Updated 3 years ago
Alternatives and similar repositories for PoltergeistAttack
Users that are interested in PoltergeistAttack are comparing it to the libraries listed below
Sorting:
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆80Updated 4 years ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Updated 4 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Updated 4 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Updated 5 years ago
- ☆49Updated 5 years ago
- ☆27Updated 4 years ago
- ☆21Updated 5 years ago
- Trojan Attack on Neural Network☆191Updated 3 years ago
- ☆68Updated 5 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆226Updated 6 years ago
- ☆19Updated 3 years ago
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17Updated 5 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Updated 2 years ago
- ☆29Updated 2 years ago
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Updated 4 years ago
- Code for the 'DARTS: Deceiving Autonomous Cars with Toxic Signs' paper☆38Updated 7 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆208Updated 3 months ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆112Updated 4 years ago
- ☆45Updated 9 months ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Updated 2 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆326Updated 2 months ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Updated 6 years ago
- Code for ML Doctor☆92Updated last year
- Privacy-preserving Federated Learning with Trusted Execution Environments☆74Updated 6 months ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Updated 4 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Updated 3 years ago
- TAOISM: A TEE-based Confidential Heterogeneous Deployment Framework for DNN Models☆50Updated last year