mindspore-ai / mindarmour
A tool box for MindSpore users to enhance model security and trustworthiness.
☆90Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for mindarmour
- MindSpore 21 days tutorials.☆77Updated 3 years ago
- AKG (Auto Kernel Generator) is an optimizer for operators in Deep Learning Networks, which provides the ability to automatically fuse ops…☆213Updated 7 months ago
- PaddleSleeve☆77Updated 4 months ago
- AI安全☆34Updated 3 years ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆26Updated 2 years ago
- Robustness benchmark for DNN models.☆66Updated 2 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- ☆48Updated 3 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆42Updated 3 years ago
- Reward Guided Test Generation for Deep Learning☆20Updated 3 months ago
- ☆17Updated 3 years ago
- Federated Deep Learning in PaddlePaddle☆497Updated last year
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆186Updated last year
- CaPC is a method that enables collaborating parties to improve their own local heterogeneous machine learning models in a setting where b…☆26Updated 2 years ago
- This is the implementation repository of our incoming ESEC/FSE 2021 paper: Exposing Numerical Bugs in Deep Learning via GradientBack-prop…☆14Updated 2 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆27Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- Fast Privacy-Preserving Machine Learning on the GPU☆78Updated 3 years ago
- A curated list of awesome resources regarding machine learning reliability.☆30Updated 3 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆10Updated 3 years ago
- ☆15Updated 5 months ago
- Code for the paper "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models"☆80Updated 2 years ago
- Papers I have collected and read in undergraduate and graduate period☆47Updated last year
- Seminar 2016☆25Updated 2 months ago
- ☆42Updated 2 years ago
- ☆23Updated 4 years ago
- Trojan Attack on Neural Network☆180Updated 2 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Updated 3 years ago
- HIGHFLIP: An easy way to bridge different federal learning platforms☆19Updated last year
- Differentially private data release for data mining [SIGKDD 2011] - convert a relational data set into a differentially-private version w…☆16Updated 9 years ago