antsecurity / advml
AI安全
☆34Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for advml
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- PaddleSleeve☆77Updated 5 months ago
- Robustness benchmark for DNN models.☆66Updated 2 years ago
- Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆56Updated 2 years ago
- Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison☆20Updated last year
- A collection of security papers on top-tier publications☆35Updated last month
- ☆48Updated 3 years ago
- Seminar 2022☆21Updated 3 weeks ago
- AI Model Security Reading Notes☆35Updated 3 months ago
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆103Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 2 years ago
- ☆23Updated last year
- Trojan Attack on Neural Network☆180Updated 2 years ago
- ☆23Updated 3 years ago
- ☆81Updated 3 years ago
- ☆16Updated 2 years ago
- ☆91Updated 4 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆117Updated 3 weeks ago
- machine learning for security☆76Updated 4 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- Academic Papers about LLM Application on Security☆109Updated 5 months ago
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆107Updated 5 years ago
- Source code for 'Lemna: Explaining deep learning based security applications'.☆22Updated 4 years ago
- ☆38Updated last year
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆157Updated 2 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Updated 6 years ago
- The white paper which discusses the security and privacy problems of large models.☆16Updated last year
- My AI security testing projects☆41Updated 5 years ago