ZhaoyangLyu / POPQORNView external linksLinks
An Algorithm to Quantify Robustness of Recurrent Neural Networks
☆49Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for POPQORN
Users that are interested in POPQORN are comparing it to the libraries listed below
Sorting:
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- "Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers" (NeurIPS 2019, previously called "A Stratified Approach …☆17Nov 16, 2019Updated 6 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- ☆17Jun 26, 2021Updated 4 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- Geometric Certifications of Neural Nets☆42Nov 22, 2022Updated 3 years ago
- ☆19Nov 27, 2020Updated 5 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 2 years ago
- ETH Robustness Analyzer for Deep Neural Networks☆343Jan 27, 2023Updated 3 years ago
- Reachability Analysis of Deep Neural Networks with Provable Guarantees☆36Feb 25, 2020Updated 5 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Jun 7, 2021Updated 4 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Apr 27, 2023Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- This repository contains all public data, python scripts, and documentation relating to NIST Public Safety Communications Research Divisi…☆11Nov 22, 2022Updated 3 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- CROWN: A Neural Network Robustness Certification Algorithm for General Activation Functions (This repository is outdated; use https://git…☆17Nov 29, 2018Updated 7 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Oct 3, 2023Updated 2 years ago
- Sherlock is a tool for output range anaylsis of Deep Neural Networks with ReLU activation units.☆30Apr 14, 2020Updated 5 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- DL2 is a framework that allows training neural networks with logical constraints over numerical values in the network (e.g. inputs, out…☆87Jul 25, 2024Updated last year
- [ICLR 2024] Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain☆10Nov 24, 2025Updated 2 months ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 5 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆18Dec 15, 2020Updated 5 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 4 years ago