DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model
☆227May 21, 2019Updated 6 years ago
Alternatives and similar repositories for DEEPSEC
Users that are interested in DEEPSEC are comparing it to the libraries listed below
Sorting:
- Robust evasion attacks against neural network to find adversarial examples☆859Jun 1, 2021Updated 4 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,410Feb 15, 2023Updated 3 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,844Dec 12, 2025Updated 2 months ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,941Dec 3, 2025Updated 2 months ago
- A Toolbox for Adversarial Robustness Research☆1,367Sep 14, 2023Updated 2 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- Robustness benchmark for DNN models.☆66Aug 8, 2022Updated 3 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆757May 3, 2022Updated 3 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,412Apr 10, 2024Updated last year
- Seminar 2016☆25Aug 19, 2024Updated last year
- Build Docker images for unibench☆16Jan 1, 2021Updated 5 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆97Jun 7, 2021Updated 4 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,079Jun 26, 2025Updated 8 months ago
- Detecting Adversarial Examples in Deep Neural Networks☆69Mar 19, 2018Updated 7 years ago
- Concolic Testing for Deep Neural Networks☆119Jul 16, 2021Updated 4 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Mar 24, 2023Updated 2 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago
- Plausible looking adversarial examples for text classification☆94Dec 16, 2018Updated 7 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆770Mar 31, 2025Updated 11 months ago
- ☆67Jul 30, 2019Updated 6 years ago
- ☆79Oct 20, 2019Updated 6 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- ☆82Oct 24, 2022Updated 3 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Feb 25, 2018Updated 8 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆125Nov 4, 2020Updated 5 years ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,142Jun 29, 2024Updated last year
- PyTorch Implemetations of Adversarial Examples☆19Jun 25, 2018Updated 7 years ago