csaw-hackml / CSAW-HackML-2020
Starting Point for the CSAW HackML 2020 competition is here: https://www.csaw.io/hackml
☆10Updated 3 years ago
Alternatives and similar repositories for CSAW-HackML-2020:
Users that are interested in CSAW-HackML-2020 are comparing it to the libraries listed below
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆18Updated 5 years ago
- Adversarial Example Attacks on Policy Learners☆40Updated 4 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆88Updated last year
- Adversarial training for Graph Neural Networks☆59Updated 3 years ago
- This is for the papers I review every week☆15Updated 4 years ago
- Source codes used on the academic paper, "A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks".☆10Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆41Updated 3 years ago
- Certifying Geometric Robustness of Neural Networks☆16Updated last year
- [IEEE S&P 22] "LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis" by Fan Wu, Yunhui Long, Ce Zhang, …☆22Updated 3 years ago
- We implement MalGAN to attack several PDF classifiers and evaluate the robustness of those models.☆23Updated 2 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆27Updated 3 years ago
- ☆23Updated 6 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- System traces dataset generation tool.☆12Updated 2 years ago
- ☆16Updated 2 years ago
- ARCD Primary-Level AI Training Environment (PrimAITE)☆17Updated last year
- VNN Neural Network Verification Competition 2021☆37Updated 3 years ago
- Locally Private Graph Neural Networks (ACM CCS 2021)☆45Updated last year
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆20Updated 6 years ago
- ☆26Updated last year
- Machine Learning for Cyber Security☆28Updated 3 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Updated 5 years ago
- Influence maximization in unknown social networks: Learning Policies for Effective Graph Sampling (official code repository)☆28Updated 2 years ago
- Leveraging network topology for better fake account detection in social networks☆10Updated last year
- ☆23Updated last year
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆100Updated 2 years ago
- The official repo for GCP-CROWN paper☆13Updated 2 years ago