pralab / secml-torch
SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models
☆49Updated 3 weeks ago
Alternatives and similar repositories for secml-torch:
Users that are interested in secml-torch are comparing it to the libraries listed below
- A Python library for Secure and Explainable Machine Learning☆172Updated 2 months ago
- Attack benchmark repository☆13Updated last month
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- A curated list of academic events on AI Security & Privacy☆147Updated 7 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆50Updated 10 months ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆208Updated 3 months ago
- ☆20Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆218Updated 2 months ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 3 months ago
- Transformer Neural Network from Dynamic Malware Detection☆28Updated 8 months ago
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 3 years ago
- ☆11Updated 2 weeks ago
- Continuous Learning for Android Malware Detection (USENIX Security 2023)☆67Updated last year
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆48Updated 6 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆11Updated 3 years ago
- ☆64Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness (ICLR 2024)☆13Updated 11 months ago
- ☆16Updated 3 years ago
- ☆122Updated 3 years ago
- Copycat CNN☆27Updated 11 months ago
- adversarial malware detection via a principled way☆20Updated last year
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆15Updated 3 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆9Updated 7 months ago
- Library for training globally-robust neural networks.☆28Updated last year