ADAPT is the open source white-box testing framework for deep neural networks
☆22Mar 15, 2023Updated 3 years ago
Alternatives and similar repositories for adapt
Users that are interested in adapt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Jun 14, 2018Updated 7 years ago
- ☆23Mar 20, 2021Updated 5 years ago
- ☆19Aug 18, 2019Updated 6 years ago
- ICSE2021 Submission☆13Aug 28, 2022Updated 3 years ago
- Implemention of "Robust Watermarking of Neural Network with Exponential Weighting" in TensorFlow.☆13Dec 2, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Feb 19, 2026Updated 2 months ago
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 8 years ago
- DeepXplore code release☆394Mar 17, 2022Updated 4 years ago
- A model-based API Fuzzer for SMT Solvers.☆16Oct 14, 2025Updated 6 months ago
- Reward Guided Test Generation for Deep Learning☆21Aug 2, 2024Updated last year
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Code release of a paper "Guiding Deep Learning System Testing using Surprise Adequacy"☆50May 26, 2022Updated 3 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆17Updated this week
- An empirical study on patch correctness☆15Nov 5, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆13Oct 10, 2023Updated 2 years ago
- The Michelson Symbolic vErifier☆13Feb 3, 2023Updated 3 years ago
- ☆10Dec 9, 2024Updated last year
- ☆29Oct 29, 2022Updated 3 years ago
- Adversarial Attack for Pre-trained Code Models☆10Jul 19, 2022Updated 3 years ago
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Feb 15, 2023Updated 3 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- ☆11Sep 27, 2018Updated 7 years ago
- ☆27May 27, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago
- 华中科技大学网络安全课程设计-Linux下的状态检测防火墙☆11Oct 17, 2022Updated 3 years ago
- ☆15Sep 17, 2025Updated 7 months ago
- Generation of comparison functions from types☆28Apr 6, 2026Updated 3 weeks ago
- Source code, datasets and models of the paper "Efficient White-box Fairness Testing through Gradient Search" by Lingfeng Zhang, Yueling Z…☆11Jul 24, 2021Updated 4 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆15Dec 5, 2023Updated 2 years ago
- Precision-guided context sensitivity for pointer analysis☆62Jul 2, 2023Updated 2 years ago
- A platform that provides users with easy access to AI services developed by Montimage and usage of explainable AI techniques (e.g., LIME,…☆10Feb 17, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A script to upload multiple samples to Virustotal via its api with Python3.☆13Apr 1, 2025Updated last year
- Copycat CNN☆28Apr 17, 2024Updated 2 years ago
- This code is for pose-guided human animation from a single image.☆16Jun 18, 2021Updated 4 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- ☆20May 12, 2022Updated 3 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Aug 31, 2021Updated 4 years ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year