Library and experiments for attacking machine learning in discrete domains
☆47Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for trickster
Users that are interested in trickster are comparing it to the libraries listed below
Sorting:
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- Proof of concept code for VoteAgain paper☆10Jul 23, 2023Updated 2 years ago
- Converts Quora's new NLU dataset to SNLI txt/jsonl format, plus test/dev split, tokenization.☆14Jan 27, 2017Updated 9 years ago
- Receiving and reading sms automatically in an Ionic 4 app☆11Aug 26, 2019Updated 6 years ago
- Programs for modeling various aspects of general relativity and cosmology.☆16Dec 25, 2014Updated 11 years ago
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- Source code for "Neural Anisotropy Directions"☆16Nov 17, 2020Updated 5 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- BrainProp: How the brain can implement reward-based error backpropagation☆17Dec 8, 2022Updated 3 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Apr 8, 2018Updated 7 years ago
- ☆30Jun 19, 2023Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Neural style transfer of text building off of neural storyteller☆26Apr 24, 2018Updated 7 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Feb 18, 2021Updated 5 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Official repo for the paper "Make Some Noise: Reliable and Efficient Single-Step Adversarial Training" (https://arxiv.org/abs/2202.01181)☆25Oct 17, 2022Updated 3 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago
- A guide on how to edit the nodes in trained tensorflow models☆27May 22, 2017Updated 8 years ago
- Repository for our ICLR 2019 paper: Discovery of Natural Language Concepts in Individual Units of CNNs☆26Mar 9, 2019Updated 6 years ago
- Document context language models☆22Nov 13, 2015Updated 10 years ago
- Evaluation tool for word embeddings☆27Feb 15, 2016Updated 10 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- OS-Harm: A Benchmark for Measuring Safety of Computer Use Agents [NeurIPS 2025 Spotlight]☆49Sep 18, 2025Updated 5 months ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- Architecture of Twint scrapper which allow download tweets on many instances without api restrictions☆10Nov 30, 2020Updated 5 years ago
- GNES Hub ship AI/ML models as Docker containers and use Docker containers as plugins.☆34Oct 30, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- CEPTA - Complex Event Processing Transportation Analysis☆12Jul 28, 2020Updated 5 years ago
- A K8s operator for managing the lifecycle of Kafka Connect connectors☆10May 21, 2024Updated last year
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- VerSign is an off-line signature verification system for banks.☆10Jun 27, 2021Updated 4 years ago
- Extract annotated misspellings from MIMIC-III.☆13Dec 17, 2020Updated 5 years ago
- Working with TensotFlowLite GPU library and DeepLab segmentation model on iOS device.☆12Feb 15, 2019Updated 7 years ago
- Python Version of Andrew Welter's Hatebase Wrapper☆10Feb 20, 2022Updated 4 years ago
- Activities and examples for Machine Learning with Flogo☆14Dec 5, 2025Updated 2 months ago
- an implementation of the dynamic convex hull algorithm by Overmars and van Leeuwen, also including concatenable queue, 2-3 tree, and left…☆11Nov 22, 2025Updated 3 months ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago