Robustness benchmark for DNN models.
☆66Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for perceptron-benchmark
Users that are interested in perceptron-benchmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆81Aug 4, 2021Updated 4 years ago
- This repo contains the implementation of paper Exploiting Neuron and Synapse Filter Dynamics in Spatial Temporal Learning of Deep Spiking…☆45Jul 25, 2024Updated last year
- ☆19Dec 8, 2022Updated 3 years ago
- The official repo for GCP-CROWN paper☆13Sep 26, 2022Updated 3 years ago
- Awesome material(papers, tools, etc.) about testing machine learning system, including deep learning system.☆47Oct 12, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- ☆11Mar 31, 2022Updated 4 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆15May 6, 2020Updated 5 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 10 months ago
- Code for the paper entitled "Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack"…☆38Aug 12, 2021Updated 4 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,408Feb 15, 2023Updated 3 years ago
- Efficient Robustness Verification for ReLU networks (this repository is outdated, don't use; checkout our new implementation at https://g…☆30Nov 1, 2019Updated 6 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227May 21, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Apache Teaclave™ is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple.☆794Sep 25, 2025Updated 6 months ago
- A complete guide to evaluate LLMs and RAGs. Both theory and code based approaches covered.☆28Nov 16, 2023Updated 2 years ago
- Code for my blog post on using S2E for malware analysis☆25Jul 16, 2019Updated 6 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- R-Judge: Benchmarking Safety Risk Awareness for LLM Agents (EMNLP Findings 2024)☆101Jan 11, 2026Updated 3 months ago
- ☆19Jun 21, 2021Updated 4 years ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated last year
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆69Jul 12, 2025Updated 9 months ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- An approximate solver for concolic execution☆22Apr 29, 2025Updated 11 months ago
- Deepmark AI enables a unique testing environment for language models (LLM) assessment on task-specific metrics and on your own data so yo…☆104Nov 24, 2023Updated 2 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- PoC exploits against various SGX enclaves☆14May 19, 2022Updated 3 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆41Apr 24, 2019Updated 6 years ago
- SGX labs designed for CIS700 Information Security and Privacy☆34Feb 14, 2023Updated 3 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- DeepScenario: An Open Driving Scenario Dataset for Autonomous Driving System Testing☆39Jan 26, 2024Updated 2 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆63Jun 6, 2019Updated 6 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 3 years ago