An Algorithm to Quantify Robustness of Recurrent Neural Networks
☆49Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for POPQORN
Users that are interested in POPQORN are comparing it to the libraries listed below
Sorting:
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- "Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers" (NeurIPS 2019, previously called "A Stratified Approach …☆17Nov 16, 2019Updated 6 years ago
- Efficient Robustness Verification for ReLU networks (this repository is outdated, don't use; checkout our new implementation at https://g…☆30Nov 1, 2019Updated 6 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- ☆17Jun 26, 2021Updated 4 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- Geometric Certifications of Neural Nets☆42Nov 22, 2022Updated 3 years ago
- Library for training globally-robust neural networks.☆31Aug 7, 2025Updated 7 months ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 2 years ago
- ETH Robustness Analyzer for Deep Neural Networks☆343Jan 27, 2023Updated 3 years ago
- Reachability Analysis of Deep Neural Networks with Provable Guarantees☆36Feb 25, 2020Updated 6 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Jun 7, 2021Updated 4 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Apr 27, 2023Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- The official implementation of paper "Drop-Activation: Implicit Parameter Reduction and Harmonious Regularization".☆10May 30, 2019Updated 6 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- [ICSE 2023] Differentiable interpretation and failure-inducing input generation for neural network numerical bugs.☆13Jan 5, 2024Updated 2 years ago
- CROWN: A Neural Network Robustness Certification Algorithm for General Activation Functions (This repository is outdated; use https://git…☆17Nov 29, 2018Updated 7 years ago
- This repository contains all public data, python scripts, and documentation relating to NIST Public Safety Communications Research Divisi…☆12Nov 22, 2022Updated 3 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- [Preprint] Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis☆10Sep 23, 2021Updated 4 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Oct 3, 2023Updated 2 years ago
- Sherlock is a tool for output range anaylsis of Deep Neural Networks with ReLU activation units.☆30Apr 14, 2020Updated 5 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Apr 29, 2022Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Dec 1, 2021Updated 4 years ago
- Evaluating Robustness of Neural Networks with Mixed Integer Programming☆117Updated this week
- Implementation of GNN ReLU branching strategies☆10Feb 13, 2021Updated 5 years ago
- [ICLR 2024] Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain☆10Nov 24, 2025Updated 3 months ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 5 years ago
- OVAL framework for BaB-based Neural Network Verification☆17Dec 18, 2025Updated 2 months ago
- ☆17Sep 15, 2017Updated 8 years ago
- Neural Network Enumeration Tool☆34Jan 8, 2026Updated 2 months ago