DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model
☆227May 21, 2019Updated 6 years ago
Alternatives and similar repositories for DEEPSEC
Users that are interested in DEEPSEC are comparing it to the libraries listed below
Sorting:
- 机器学习安全相关论文、代码☆42Sep 1, 2019Updated 6 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,946Dec 3, 2025Updated 3 months ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- A Toolbox for Adversarial Robustness Research☆1,365Sep 14, 2023Updated 2 years ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,893Dec 12, 2025Updated 3 months ago
- Seminar 2016☆25Aug 19, 2024Updated last year
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆525Oct 15, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆759May 3, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- Build Docker images for unibench☆16Jan 1, 2021Updated 5 years ago
- ☆82Oct 24, 2022Updated 3 years ago
- Robustness benchmark for DNN models.☆66Aug 8, 2022Updated 3 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,425Apr 10, 2024Updated last year
- seed files used in UNIFUZZ experiments☆14Mar 17, 2021Updated 5 years ago
- ☆12Dec 22, 2025Updated 3 months ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- ☆79Oct 20, 2019Updated 6 years ago
- ☆11Oct 18, 2022Updated 3 years ago
- This repository contains the pytorch attempts to replicate the results from the recent DeepMind Paper, "On the Effectiveness of Interval …☆10May 27, 2019Updated 6 years ago
- Plausible looking adversarial examples for text classification☆94Dec 16, 2018Updated 7 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"☆216Jan 26, 2021Updated 5 years ago
- Pytorch code to generate adversarial examples on mnist and ImageNet data.☆118Dec 31, 2018Updated 7 years ago
- A pytorch adversarial library for attack and defense methods on images and graphs☆1,080Jun 26, 2025Updated 8 months ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Feb 7, 2019Updated 7 years ago
- Directed fuzzing framework for gVisor.☆26Oct 26, 2023Updated 2 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆906Jun 10, 2023Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago