pralab / secml-torch
SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models
☆49Updated 2 months ago
Alternatives and similar repositories for secml-torch
Users that are interested in secml-torch are comparing it to the libraries listed below
Sorting:
- A Python library for Secure and Explainable Machine Learning☆176Updated 3 months ago
- Attack benchmark repository☆14Updated 3 weeks ago
- A curated list of academic events on AI Security & Privacy☆150Updated 8 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆209Updated 4 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆17Updated last year
- ☆22Updated last year
- Source code for the Energy-Latency Attacks via Sponge Poisoning paper.☆15Updated 3 years ago
- Code library for the Tesseract framework from 'TESSERACT: Eliminating experimental bias in malware classification across space and time'☆12Updated 5 months ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- ☆144Updated 7 months ago
- Code for the AsiaCCS 2021 paper: "Malware makeover: Breaking ML-based static analysis by modifying executable bytes"☆51Updated last year
- Security evaluation module with onnx, pytorch, and SecML.☆13Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Code for ML Doctor☆87Updated 9 months ago
- ☆66Updated 4 years ago
- ☆28Updated 2 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆221Updated last month
- ☆12Updated last month
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆165Updated 4 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆11Updated 3 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆263Updated 5 months ago
- Papers I have collected and read in undergraduate and graduate period☆51Updated last year
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆30Updated 4 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 6 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 7 years ago
- Transformer Neural Network from Dynamic Malware Detection☆30Updated 10 months ago