AI安全
☆35Dec 28, 2020Updated 5 years ago
Alternatives and similar repositories for advml
Users that are interested in advml are comparing it to the libraries listed below
Sorting:
- Iot-vulhub 自建镜像版☆12May 1, 2022Updated 3 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Java* Fuzzer for Android*☆12Nov 3, 2016Updated 9 years ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆13Jan 31, 2024Updated 2 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- a taint analysis tool for android apps☆13Oct 2, 2020Updated 5 years ago
- ☆69Oct 8, 2021Updated 4 years ago
- Source code for "WCP: Worst-Case Perturbations for Semi-Supervised Deep Learning" in CPVR 2020.☆23Jul 22, 2020Updated 5 years ago
- BiasFinder | IEEE TSE | Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems☆11Jan 18, 2022Updated 4 years ago
- RankGAN: A Maximum Margin Ranking GAN for Generating Faces☆14May 9, 2019Updated 6 years ago
- temporal-segment-networks\Forward calculation\c++☆12Nov 3, 2018Updated 7 years ago
- Code, data, and models for the EMNLP 2020 paper "Learning to Fuse Sentences with Transformers for Summarization"☆16Nov 2, 2022Updated 3 years ago
- ☆37Sep 30, 2024Updated last year
- Unleash the full potential of exascale LLMs on consumer-class GPUs, proven by extensive benchmarks, with no long-term adjustments and min…☆26Nov 11, 2024Updated last year
- Implementation of LambdaMART for ranking☆16Feb 3, 2020Updated 6 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- LLM-based mutation testing☆14Feb 3, 2025Updated last year
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 3 years ago
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆12Dec 27, 2022Updated 3 years ago
- TensorFlow API analysis tool and malicious model detection tool☆39May 27, 2025Updated 9 months ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆82Aug 5, 2025Updated 7 months ago
- Attack Traffic Generation(ATG) tool enable users to explore automotive CAN bus cyber-security rapidly☆18Jun 26, 2018Updated 7 years ago
- 🌟 SwarmAgent: A framework for simulating social group dynamics using multi-agent collaboration, aiding insights into collective behavior…☆13Dec 5, 2023Updated 2 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- 聊天机器人完整版☆15Feb 5, 2021Updated 5 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆22Aug 7, 2023Updated 2 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- PaddleSleeve☆79Feb 3, 2026Updated last month
- 一个用tikz绘制多维评价雷达图的自定义环境,以便于在LaTeX绘制多维评价雷达图。☆12Jan 5, 2019Updated 7 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- Extensions for OpenJDK for Eclipse OpenJ9☆23Updated this week
- ☆10Jan 7, 2026Updated 2 months ago
- patch presence test via symbolic signatures, ICSE'24☆12Mar 29, 2024Updated last year
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- ☆13Jan 7, 2025Updated last year
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆26Sep 13, 2025Updated 6 months ago