Benchmarking and Visualization Tool for Adversarial Machine Learning
☆188Apr 4, 2023Updated 2 years ago
Alternatives and similar repositories for EvadeML-Zoo
Users that are interested in EvadeML-Zoo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆111Sep 12, 2022Updated 3 years ago
- Countering Adversarial Image using Input Transformations.☆496Sep 29, 2021Updated 4 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130May 1, 2023Updated 2 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆760May 3, 2022Updated 3 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆124Nov 4, 2020Updated 5 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 3 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆508Aug 30, 2021Updated 4 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆908Jun 10, 2023Updated 2 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Robust evasion attacks against neural network to find adversarial examples☆858Jun 1, 2021Updated 4 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 9 months ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,948Dec 3, 2025Updated 3 months ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆39Jan 4, 2019Updated 7 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,412Feb 15, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- A Toolbox for Adversarial Robustness Research☆1,362Sep 14, 2023Updated 2 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,424Apr 10, 2024Updated last year
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for "Robustness May Be at Odds with Accuracy"☆90Mar 24, 2023Updated 3 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆260Apr 16, 2021Updated 4 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆88Jan 17, 2019Updated 7 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago