Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
☆44Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for athena
Users that are interested in athena are comparing it to the libraries listed below
Sorting:
- Code and data for the paper "Pretrained Language Models are Symbolic Mathematics Solvers too!", arXiv:2110.03501☆12Nov 23, 2022Updated 3 years ago
- Source for paper "Attacking Binarized Neural Networks"☆23Mar 23, 2018Updated 7 years ago
- Tensorflow Operation Wrapper of cppjieba (Chinese Word Segamentation)☆10Oct 21, 2019Updated 6 years ago
- Data-centric defense mechanism against Spectre attacks. (DAC'19)☆11Nov 6, 2019Updated 6 years ago
- Source code of IPA, https://escholarship.org/uc/item/2p0805dq☆12Jun 27, 2024Updated last year
- Shortest Path prediction using Graph Convolutional Networks☆27Jan 19, 2018Updated 8 years ago
- generative-camouflaged-spam-detector☆11Aug 20, 2020Updated 5 years ago
- ☆15Aug 15, 2024Updated last year
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Modular Adversarial Robustness Toolkit☆21Jul 11, 2025Updated 7 months ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- (HotMobile'24) Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile Computing☆17Jan 22, 2024Updated 2 years ago
- CVPR'17 Spotlight: What’s in a Question: Using Visual Questions as a Form of Supervision☆44Aug 31, 2018Updated 7 years ago
- We have developed Symbol Demonstration Direct Preference Optimization (SymDPO) and validating its effectiveness across multiple benchmark…☆23Nov 22, 2024Updated last year
- A Framework for Reasoning about System Performance using Causal AI☆44Apr 10, 2022Updated 3 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- ☆21May 13, 2022Updated 3 years ago
- Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural trai…☆177May 3, 2024Updated last year
- Simple classifier to classify SVHN images, based on Keras with the Tensorflow backend.☆17Feb 26, 2018Updated 8 years ago
- ☆18Sep 25, 2019Updated 6 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Aug 3, 2021Updated 4 years ago
- Scaleable input gradient regularization☆22Jul 8, 2019Updated 6 years ago
- Programa simple hecho en python que destruye tokens de discord.☆11Feb 25, 2023Updated 3 years ago
- ☆25Jun 9, 2022Updated 3 years ago
- Fast, Accurate and Convenient Light-Weight HLS Framework for Academic Design Space Exploration and Evaluation. (LLVM-11)☆62Mar 17, 2022Updated 3 years ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆70Feb 22, 2024Updated 2 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- ☆29Nov 5, 2021Updated 4 years ago
- Selected problems and their solutions from the book on "Machine Intelligence in Design Automation"☆27Dec 9, 2018Updated 7 years ago
- Automated deep learning!☆25Oct 6, 2017Updated 8 years ago
- ☆35Jan 9, 2019Updated 7 years ago
- ☆12Updated this week
- A behavioural cache model for analysing the cache behaviour under side-channel attack.☆28Jun 25, 2025Updated 8 months ago
- ☆28Jan 18, 2026Updated last month
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago