mindspore-ai / mindarmourView external linksLinks
A tool box for MindSpore users to enhance model security and trustworthiness.
☆93Sep 14, 2025Updated 5 months ago
Alternatives and similar repositories for mindarmour
Users that are interested in mindarmour are comparing it to the libraries listed below
Sorting:
- ☆11Feb 25, 2023Updated 2 years ago
- ☆15Dec 10, 2022Updated 3 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- 基于MindSpore的TinyRAG实现☆19Dec 31, 2024Updated last year
- ☆19Jun 27, 2021Updated 4 years ago
- Code and experiments for the adversarial detection paper☆21Jun 11, 2021Updated 4 years ago
- A high-performance, scalable MindSpore reinforcement learning framework.☆52Jul 1, 2024Updated last year
- ☆21Jun 1, 2018Updated 7 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆23Dec 5, 2017Updated 8 years ago
- Minimal manifest for building Pixel 2 (XL) boot images☆19Aug 7, 2018Updated 7 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- Code for Paper "Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption"☆34Nov 17, 2022Updated 3 years ago
- ☆27May 27, 2020Updated 5 years ago
- ☆12Aug 2, 2024Updated last year
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- dropbox of random test code...☆33Dec 22, 2015Updated 10 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- Fortifying Toxic Speech Detectors Against Veiled Toxicity☆11Oct 21, 2020Updated 5 years ago
- ☆12Dec 22, 2025Updated last month
- DevSecOps Working Group☆12Sep 24, 2019Updated 6 years ago
- ☆11Apr 15, 2021Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- A Snippet generator for opencv.☆10Mar 2, 2024Updated last year
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Repository for participants of the "Containers for HPC" training☆11Oct 8, 2025Updated 4 months ago
- ☆15Feb 2, 2026Updated last week
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- An automated NFC fuzzing framework for Android devices.☆143Nov 19, 2020Updated 5 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- ☆41Jan 12, 2017Updated 9 years ago
- wav2lip-api☆11Mar 16, 2023Updated 2 years ago
- ☆12Oct 21, 2020Updated 5 years ago
- Python 3 implementations of some of the fundamental Machine Learning models and algorithms from scratch.☆10Sep 16, 2022Updated 3 years ago
- 使用AIDL进行跨进程通信☆11Feb 18, 2017Updated 8 years ago
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago