Yuanyuan-Yuan / GCertLinks
Research Artifact of USENIX Security 2023 Paper: Precise and Generalized Robustness Certification for Neural Networks
☆13Updated 2 years ago
Alternatives and similar repositories for GCert
Users that are interested in GCert are comparing it to the libraries listed below
Sorting:
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 4 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Updated 5 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- The library for symbolic interval☆22Updated 5 years ago
- This repository contains the evaluation code for the NDSS 2024 paper: MPCDIFF: Testing and Repairing MPC-Hardened Deep Learning Models.☆16Updated 2 years ago
- CIPHERH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations☆13Updated 2 years ago
- ☆11Updated last year
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- Differential Privacy Testing System☆22Updated 5 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated 2 years ago
- ☆15Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Updated 2 years ago
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆25Updated 5 years ago
- ☆127Updated last year
- ☆31Updated last year
- Code release for RobOT (ICSE'21)☆15Updated 3 years ago
- A tool for testing SMT solvers for incompleteness bugs☆17Updated 3 years ago
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated last year
- Code for tracelet-level symbolic execution☆18Updated 3 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆33Updated last year
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Updated 10 months ago
- ☆17Updated last year
- Open source release from our ICLR 2020 paper, CLN2INV: Learning Loop Invariants with Continuous Logic Networks.☆21Updated 5 years ago
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Updated last year
- AI-powered web scraper for harvesting and analyzing Computing Research Association job listings.☆19Updated last year
- ☆39Updated last month
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆82Updated 3 years ago