Vision based algorithms for falsification of convolutional neural networks
☆12Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for SafeCV
Users that are interested in SafeCV are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Safety Verification of Deep Neural Networks☆50Feb 5, 2018Updated 8 years ago
- Testing Deep Neural Networks☆15Jul 4, 2018Updated 7 years ago
- ☆18Mar 26, 2019Updated 6 years ago
- Repository containing code for getting statistical guarantees on properties of BNNs☆13Apr 24, 2019Updated 6 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks☆15Apr 2, 2019Updated 6 years ago
- ☆27May 27, 2020Updated 5 years ago
- Optimizers for performing approximate Bayesian inference on neural network parameters with Tensorflow and JAX☆13Feb 17, 2024Updated 2 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- 使用AIDL进行跨进程通信☆11Feb 18, 2017Updated 9 years ago
- Reachability analysis and synthesis of parameters for polynomial dynamical systems☆11May 15, 2023Updated 2 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 5 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆90Nov 1, 2017Updated 8 years ago
- DeepXplore code release☆395Mar 17, 2022Updated 4 years ago
- The released code of Neurify in NIPS 2018☆51Dec 8, 2022Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- ☆16Dec 12, 2014Updated 11 years ago
- OVAL framework for BaB-based Neural Network Verification☆17Dec 18, 2025Updated 3 months ago
- Adversarial Robustness on In- and Out-Distribution Improves Explainability☆12Feb 10, 2022Updated 4 years ago
- Java memoization library☆19Feb 8, 2024Updated 2 years ago
- Mozilla's Community Support Software☆19Mar 29, 2021Updated 4 years ago
- Playing around with various jailbreaking techniques ahead of the Gray Swan AI Ultimate Jailbreaking Competition☆18Oct 6, 2024Updated last year
- ☆44Aug 25, 2017Updated 8 years ago
- Generation of sequential and concurrent unit tests to find correctness and performance problems in Java classes☆16Jul 20, 2019Updated 6 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- Machine Learning course at dsai.asia☆16Aug 17, 2022Updated 3 years ago
- A super lightweight Lagrangian model for calculating millions of WRF trajectories.☆19Nov 22, 2020Updated 5 years ago
- A set of advanced image editing tools.☆12Jun 21, 2016Updated 9 years ago
- Style Transfer based on Generative Adversarial Network☆15Sep 3, 2017Updated 8 years ago
- Mastering PyTorch for Deep Learning, Published by Packt☆14Jan 14, 2021Updated 5 years ago
- Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommende…☆25Apr 12, 2021Updated 4 years ago
- ☆22Jun 23, 2021Updated 4 years ago
- Concolic Testing for Deep Neural Networks☆119Jul 16, 2021Updated 4 years ago
- An automatic Builder Pattern generator for Java☆16Feb 4, 2016Updated 10 years ago
- ☆57Mar 24, 2023Updated 2 years ago
- A neural network made for OCR of handwritten uppercase English letters based on Fukushima's 1988 Neocognitron.☆18Jun 5, 2014Updated 11 years ago
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago