DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model
☆228May 21, 2019Updated 7 years ago
Alternatives and similar repositories for DEEPSEC
Users that are interested in DEEPSEC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust evasion attacks against neural network to find adversarial examples☆863Jun 1, 2021Updated 4 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,406Feb 15, 2023Updated 3 years ago
- 机器学习安全相关论文、代码☆42Sep 1, 2019Updated 6 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,958Dec 3, 2025Updated 5 months ago
- A Toolbox for Adversarial Robustness Research☆1,368Sep 14, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,988Dec 12, 2025Updated 5 months ago
- Seminar 2016☆25Aug 19, 2024Updated last year
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 7 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆764May 3, 2022Updated 4 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆744May 16, 2024Updated 2 years ago
- Build Docker images for unibench☆17Jan 1, 2021Updated 5 years ago
- ☆82Oct 24, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Robustness benchmark for DNN models.☆66Aug 8, 2022Updated 3 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,433Apr 10, 2024Updated 2 years ago
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- ☆12Dec 22, 2025Updated 5 months ago
- Implementation of Papers on Adversarial Examples☆396Apr 24, 2023Updated 3 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆112Feb 14, 2018Updated 8 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- ☆79Oct 20, 2019Updated 6 years ago
- ☆11Oct 18, 2022Updated 3 years ago
- This repository contains the pytorch attempts to replicate the results from the recent DeepMind Paper, "On the Effectiveness of Interval …☆10May 27, 2019Updated 6 years ago
- Plausible looking adversarial examples for text classification☆94Dec 16, 2018Updated 7 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Pytorch code to generate adversarial examples on mnist and ImageNet data.☆118Dec 31, 2018Updated 7 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,084Jun 26, 2025Updated 10 months ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago