☆27May 27, 2020Updated 5 years ago
Alternatives and similar repositories for m_testing_adversatial_sample
Users that are interested in m_testing_adversatial_sample are comparing it to the libraries listed below
Sorting:
- Developed with the UROP, Detecting Deep Learning Software Defects (Spring 2019), HKUST☆25Dec 24, 2020Updated 5 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Code release of a paper "Guiding Deep Learning System Testing using Surprise Adequacy"☆50May 26, 2022Updated 3 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- ☆25Mar 20, 2021Updated 4 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago
- A GAN demo project☆12Jan 2, 2020Updated 6 years ago
- ☆10Feb 3, 2021Updated 5 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- This is the implement repository of our upcoming ESEC/FSE 2020 paper: Deep Learning Library Testing via Effective Model Generation.☆55Oct 29, 2023Updated 2 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆101Oct 13, 2018Updated 7 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- ☆19Aug 18, 2019Updated 6 years ago
- Testing Deep Neural Networks☆15Jul 4, 2018Updated 7 years ago
- Python Library for Random Walks☆23May 2, 2024Updated last year
- Code release for RobOT (ICSE'21)☆15Dec 5, 2022Updated 3 years ago
- A graph algorithm for evaluating node distances.☆25Dec 23, 2020Updated 5 years ago
- DeepCrime - Mutation Testing Tool for Deep Learning Systems☆16Sep 23, 2023Updated 2 years ago
- A systematic testing tool for automatically detecting erroneous behaviors of DNN-driven vehicles☆81Feb 12, 2019Updated 7 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆90Nov 1, 2017Updated 8 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- Reward Guided Test Generation for Deep Learning☆21Aug 2, 2024Updated last year
- ADAPT is the open source white-box testing framework for deep neural networks☆22Mar 15, 2023Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆53Jun 14, 2018Updated 7 years ago
- This repository contains the implementation and the evaluation of our ESEC/FSE 2020 paper: Detecting Numerical Bugs in Neural Network Ar…☆25Dec 17, 2020Updated 5 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- ☆29Oct 29, 2022Updated 3 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆29Feb 8, 2021Updated 5 years ago
- Port of the LLVM compiler infrastructure to the time-predictable processor Patmos☆15Apr 2, 2025Updated 10 months ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- ☆12Feb 15, 2024Updated 2 years ago
- ☆11Jul 25, 2020Updated 5 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago