☆13Nov 18, 2025Updated 5 months ago
Alternatives and similar repositories for AI-Security
Users that are interested in AI-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 19, 2024Updated 2 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 7 months ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 6 months ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14Dec 31, 2024Updated last year
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆21Mar 22, 2025Updated last year
- Official Codebase of "A Unified Audio-Visual Learning Framework for Localization, Separation, and Recognition" (ICML 2023)☆12Jun 1, 2023Updated 2 years ago
- Pix2PixCC codes: an improved model for image-to-image translation and scientific data analysis☆13Jul 14, 2025Updated 9 months ago
- Official implementation of the paper "Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks"☆20Jun 9, 2025Updated 10 months ago
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆19Jun 19, 2023Updated 2 years ago
- https://arxiv.org/abs/2106.12442☆10Jun 22, 2021Updated 4 years ago
- 📊 Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case. A. Giannopoulos, D. Mouris M.S…☆20Dec 5, 2023Updated 2 years ago
- An Empirical Study of Federated Unlearning: Efficiency and Effectiveness (Accepted Conference Track Papers at ACML 2023)☆17Sep 29, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Nov 12, 2023Updated 2 years ago
- ☆12Mar 26, 2024Updated 2 years ago
- Custom ML tracking experiment and debugging tools.☆15Aug 2, 2022Updated 3 years ago
- Solution for CarRacing-v0 environment from OpenAI Gym. It uses the Deep Deterministic Policy Gradient algorithm.☆12Nov 18, 2022Updated 3 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- Rethinking Data Heterogeneity in Federated Learning: Introducing a New Notion and Standard Benchmarks☆26Nov 13, 2022Updated 3 years ago
- ☆17Nov 16, 2023Updated 2 years ago
- MPC team of Security Group in HITSZ☆19Apr 19, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🏷算法(第四版)PDF+源码☆16Nov 28, 2019Updated 6 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Jan 17, 2025Updated last year
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- This repository compiles a list of papers related to intellectual property (IP) protection for deep learning models.☆17Feb 18, 2025Updated last year
- The pytorch code of FedDISC (Federated Diffusion-Inspired Semi-supervised Co-training method)☆11Sep 3, 2023Updated 2 years ago
- Automate process for view classification of the Apical 4 chamber, Apical 2 chamber and Parasternal long axis. Segmentation of the Apical …☆24Jun 17, 2024Updated last year
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆25Sep 22, 2023Updated 2 years ago
- Official repository of "Prompting Segmentation with Sound is Generalizable Audio-Visual Source Localizer", AAAI 2024☆27Mar 14, 2026Updated last month
- ☆23Mar 20, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Backdoor Stuff in AI/ ML domain☆35Updated this week
- [CVPR 2023] Official implementation of our paper - Learning Audio-Visual Source Localization via False Negative Aware Contrastive Learnin…☆27Apr 10, 2023Updated 3 years ago
- [Official] [IROS 2024] A goal-oriented planning to lift VLN performance for Closed-Loop Navigation: Simple, Yet Effective☆28Apr 4, 2024Updated 2 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradi…☆31Jun 9, 2021Updated 4 years ago
- This project used STBP-tdBN method to directly train Deep Spiking Neural Networks from scratch with PyTorch☆36Feb 2, 2023Updated 3 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago