andrewlewis / camera-idLinks
Digital camera identification tool
☆18Updated 10 years ago
Alternatives and similar repositories for camera-id
Users that are interested in camera-id are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of MalConv☆71Updated 3 years ago
- Breaking the Alaska steganalysis challenge☆45Updated 2 years ago
- ☆19Updated 4 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆128Updated 7 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated 2 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Updated 6 years ago
- Model extraction attacks on Machine-Learning-as-a-Service platforms.☆351Updated 4 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Updated 5 years ago
- ☆79Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- ☆233Updated 6 years ago
- DSP-FWA: Dual Spatial Pyramid for Exposing Face Warp Artifacts in DeepFake Videos☆68Updated last year
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆54Updated last year
- The unofficial https://deepfakedetectionchallenge.ai/ github repo. A quick and easy way to get insight to current progress and previous w…☆89Updated 6 years ago
- Privacy Testing for Deep Learning☆210Updated 3 weeks ago
- Contest Proposal and infrastructure for the Unrestricted Adversarial Examples Challenge☆331Updated 5 years ago
- Steps towards physical adversarial attacks on facial recognition☆83Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆214Updated 3 months ago
- Create adversarial attacks against machine learning Windows malware detectors☆234Updated 3 months ago
- A library for performing coverage guided fuzzing of neural networks☆214Updated 7 years ago
- Implementation of the Capsule-Forensics-v2☆120Updated 3 years ago
- A library for adversarial classifier evasion☆43Updated 10 years ago
- ☆30Updated 8 years ago
- ☆173Updated 5 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- This is the implementation of MalConv proposed in [Malware Detection by Eating a Whole EXE](https://arxiv.org/abs/1710.09435) and its adv…☆89Updated 6 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆79Updated 2 years ago