DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model
☆227May 21, 2019Updated 6 years ago
Alternatives and similar repositories for DEEPSEC
Users that are interested in DEEPSEC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust evasion attacks against neural network to find adversarial examples☆860Jun 1, 2021Updated 4 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,408Feb 15, 2023Updated 3 years ago
- 机器学习安全相关论文、代码☆42Sep 1, 2019Updated 6 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,952Dec 3, 2025Updated 4 months ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,917Dec 12, 2025Updated 3 months ago
- Seminar 2016☆25Aug 19, 2024Updated last year
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- Build Docker images for unibench☆17Jan 1, 2021Updated 5 years ago
- ☆82Oct 24, 2022Updated 3 years ago
- Robustness benchmark for DNN models.☆66Aug 8, 2022Updated 3 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,424Apr 10, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- ☆11Dec 22, 2025Updated 3 months ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆112Feb 14, 2018Updated 8 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- ☆79Oct 20, 2019Updated 6 years ago
- ☆11Oct 18, 2022Updated 3 years ago
- This repository contains the pytorch attempts to replicate the results from the recent DeepMind Paper, "On the Effectiveness of Interval …☆10May 27, 2019Updated 6 years ago
- Plausible looking adversarial examples for text classification☆94Dec 16, 2018Updated 7 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆215Jan 26, 2021Updated 5 years ago
- Pytorch code to generate adversarial examples on mnist and ImageNet data.☆118Dec 31, 2018Updated 7 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,080Jun 26, 2025Updated 9 months ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆44Feb 7, 2019Updated 7 years ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago