pralab / secml-torch
SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models
☆48Updated last month
Alternatives and similar repositories for secml-torch:
Users that are interested in secml-torch are comparing it to the libraries listed below
- A Python library for Secure and Explainable Machine Learning☆172Updated last month
- A curated list of academic events on AI Security & Privacy☆146Updated 6 months ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆162Updated 4 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 6 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 6 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆208Updated 2 months ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆11Updated 3 years ago
- ☆64Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆76Updated last year
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆71Updated 11 months ago
- A unified benchmark problem for data poisoning attacks☆152Updated last year
- ☆142Updated 4 months ago
- Copycat CNN☆27Updated 10 months ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆98Updated 6 months ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- ☆18Updated last year
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 2 years ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Updated 2 years ago
- ☆50Updated 3 years ago
- Code for ML Doctor☆86Updated 6 months ago
- Code for the paper: Label-Only Membership Inference Attacks☆64Updated 3 years ago
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆50Updated 2 years ago
- A paper list for localized adversarial patch research☆144Updated last year
- ☆318Updated 2 months ago