persistz / attack-as-defenseView external linksLinks
Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.
☆12Sep 4, 2021Updated 4 years ago
Alternatives and similar repositories for attack-as-defense
Users that are interested in attack-as-defense are comparing it to the libraries listed below
Sorting:
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Collect simple coverage information in memory.☆11Oct 6, 2022Updated 3 years ago
- ☆27May 27, 2020Updated 5 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Nov 18, 2022Updated 3 years ago
- A repo to store what M1 explainer does and ~Armv9~ Armv8.6 ISA on A16☆19Sep 28, 2024Updated last year
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- This repo stores a more profound view of Computer Architecture: A Quantitative Approach that tells multi-tenancy, virtualize, fine graine…☆29Dec 24, 2025Updated last month
- Port of the LLVM compiler infrastructure to the time-predictable processor Patmos☆15Apr 2, 2025Updated 10 months ago
- Using SVF in Python Projects☆14Feb 6, 2026Updated last week
- ☆12Feb 15, 2024Updated last year
- ☆11Aug 23, 2023Updated 2 years ago
- RISC-V 64 CPU☆10Oct 4, 2025Updated 4 months ago
- Transparent serialization of python plain-old-data classes☆12Aug 31, 2022Updated 3 years ago
- LifeGame homework of Software Engineering MOOC (http://www.xuetangx.com/courses/TsinghuaX/34100325X/2015_T1/about)☆10Mar 18, 2016Updated 9 years ago
- compatible library for ebpf programs to improve BTF portability☆14Oct 11, 2023Updated 2 years ago
- 基于X86架构的简单Cminus语言编译器☆10Apr 1, 2022Updated 3 years ago
- Generate Linux Perf event tables for Apple Silicon☆17Dec 16, 2025Updated last month
- QL-Relax☆13Aug 12, 2025Updated 6 months ago
- An implementation of memcpy for amd64 with clang/gcc☆15Feb 7, 2022Updated 4 years ago
- An MLIR-based AI compiler designed for Python frontend to RISC-V DSA☆13Oct 10, 2024Updated last year
- OCEAN – Open-source CXL Emulation at Hyperscale Architecture and Networking.☆20Updated this week
- Videocore Backend for llvm☆23Feb 3, 2015Updated 11 years ago
- derper's mom☆13Oct 28, 2025Updated 3 months ago
- Dynamic NFTs is a code-pattern & tooling that enables web3 creators to have true ownership of assets and create upgradable NFTs in a trus…☆13Jan 11, 2022Updated 4 years ago
- An online simulator for finite automata (FA), pushdown automata (PDA) and linear bounded automata (LBA).☆11Oct 30, 2017Updated 8 years ago
- An instruction of how to modify bios image to enable avx512 for alderlake CPU on modern gigabyte motherboards☆13Feb 2, 2023Updated 3 years ago
- A Rust library to handle OpenSSH key and other common SSH key☆15Jun 3, 2023Updated 2 years ago
- A tool for cross-checking Verilog compilers☆14Apr 16, 2025Updated 9 months ago
- A sample kernel module showing the memory reordering.☆11May 30, 2020Updated 5 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆18Jan 28, 2026Updated 2 weeks ago
- ☆10Nov 12, 2019Updated 6 years ago
- Official repository for the paper "ALERT: A Comprehensive Benchmark for Assessing Large Language Models’ Safety through Red Teaming"☆54Sep 20, 2024Updated last year
- Performance Evaluation of AF_XDP Communication Patterns. Artifacts for "Are Kernel Drivers Ready For Accelerated Packet Processing Using …☆11Jun 11, 2024Updated last year
- DWARF-based stack walks with eBPF☆13Aug 18, 2021Updated 4 years ago
- Software Instrumentation Dynamically Enabled☆13Updated this week
- ☆11Jun 9, 2023Updated 2 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago