maurapintor / pandavisionLinks
Security evaluation module with onnx, pytorch, and SecML.
☆13Updated 3 years ago
Alternatives and similar repositories for pandavision
Users that are interested in pandavision are comparing it to the libraries listed below
Sorting:
- A Python library for Secure and Explainable Machine Learning☆184Updated last month
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated 2 months ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆66Updated this week
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆230Updated last month
- Realization of paper: "Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN" 2017☆126Updated 7 years ago
- ☆19Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- This is a paper list about Machine Learning for IDSes☆89Updated 11 months ago
- Code for our DLS'21 paper - BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware. BODMAS is short for Blue Hexagon …☆84Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆93Updated 2 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 3 months ago
- ☆116Updated 5 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆182Updated last year
- ☆55Updated 5 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- Adversarial Malware Generator Using GANs☆54Updated last year
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆70Updated 4 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- Transformer Neural Network from Dynamic Malware Detection☆34Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆157Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆140Updated 2 years ago
- Feature Extraction and Machine Learning from Network Traffic Traces☆71Updated last year
- ☆79Updated 5 years ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆875Updated 3 weeks ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 10 months ago