机器学习安全相关论文、代码
☆42Sep 1, 2019Updated 6 years ago
Alternatives and similar repositories for MLsecurity
Users that are interested in MLsecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probabilistic Jacobian-based Saliency Maps Attacks☆19Nov 28, 2020Updated 5 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227May 21, 2019Updated 6 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Dec 23, 2020Updated 5 years ago
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- 变声器设计MATLAB代码☆13Jul 6, 2020Updated 5 years ago
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- 神经风格迁移——基于keras实现(VGG19)2019-2-23☆10Mar 3, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simplified Source Code Pre-Training for Vulnerability Detection☆118Dec 4, 2025Updated 5 months ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Software vulnerability detection using machine learning through source codes (Exp-1). Replication of https://arxiv.org/abs/1807.04320.☆51Nov 24, 2021Updated 4 years ago
- 模式识别期末项目-基于Keras的人物面部表情识别☆11Jun 25, 2019Updated 6 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆127Jan 30, 2018Updated 8 years ago
- Robust evasion attacks against neural network to find adversarial examples☆861Jun 1, 2021Updated 4 years ago
- ☆13Jun 8, 2021Updated 4 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆79Jan 13, 2022Updated 4 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Machine Learning in Action(机器学习实战)☆16Dec 19, 2017Updated 8 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Mar 24, 2023Updated 3 years ago
- PNAS LaTeX and LyX templates☆14Aug 14, 2015Updated 10 years ago
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- Density Constrained Reinforcement Learning☆12Mar 24, 2023Updated 3 years ago
- Dockerfile to install and run heartbleed tool☆32Jun 16, 2017Updated 8 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Feb 27, 2021Updated 5 years ago
- ☆20Feb 8, 2024Updated 2 years ago
- ☆10May 14, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repo is the implementation of the paper "GraphSearchNet: Enhancing GNNs via Capturing Global Dependency for Semantic Code Search". W…☆32Dec 31, 2022Updated 3 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,407Feb 15, 2023Updated 3 years ago
- Pytorch plugin to generate saliency maps for neural networks☆12Nov 1, 2018Updated 7 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- Translate pic to JPEG☆11Mar 6, 2019Updated 7 years ago
- Data pre-processing, analysis, visualization, D-reduction, and classification with different model/data -driven optimization techniques☆11Dec 29, 2019Updated 6 years ago