csaw-hackml / CSAW-HackML-2020Links
Starting Point for the CSAW HackML 2020 competition is here: https://www.csaw.io/hackml
☆10Updated 4 years ago
Alternatives and similar repositories for CSAW-HackML-2020
Users that are interested in CSAW-HackML-2020 are comparing it to the libraries listed below
Sorting:
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Updated 7 years ago
- Adversarial training for Graph Neural Networks☆61Updated 4 years ago
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆130Updated 7 years ago
- Adversarial Attack on Graph Structured Data (https://arxiv.org/abs/1806.02371)☆129Updated 3 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆227Updated 6 years ago
- Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".☆221Updated 3 years ago
- Adversarial attacks and defenses on Graph Neural Networks.☆393Updated last year
- A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models☆35Updated 4 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆60Updated 6 years ago
- Trojan Attack on Neural Network☆191Updated 3 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆226Updated last month
- Certifying Geometric Robustness of Neural Networks☆16Updated 2 years ago
- Robustness benchmark for DNN models.☆66Updated 3 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Updated 4 years ago
- Implementation of the paper "Adversarial Attacks on Graph Neural Networks via Meta Learning".☆154Updated 4 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Updated 5 years ago
- ☆24Updated 7 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
- ☆67Updated 6 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Updated 2 years ago
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆20Updated 5 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆60Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆107Updated last year
- ☆12Updated 5 years ago
- This is for the papers I review every week☆14Updated 5 years ago
- ☆101Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 6 years ago
- ☆151Updated last year
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated 2 years ago
- A large-scale database for graph representation learning☆55Updated 3 years ago