Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf
☆28Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for verified-global-properties
Users that are interested in verified-global-properties are comparing it to the libraries listed below
Sorting:
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- Library for training globally-robust neural networks.☆31Aug 7, 2025Updated 7 months ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 2 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- This is the code for the Pluto framework to assess data exposure by an Android app to an advertising library. The framework was presented…☆13Jan 23, 2018Updated 8 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- Collect simple coverage information in memory.☆11Oct 6, 2022Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation☆17Dec 3, 2020Updated 5 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Mar 24, 2023Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69May 31, 2024Updated last year
- ☆16Dec 3, 2021Updated 4 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- Mutation-based implementation of a random equivalence testing strategy for active automata learning☆16Dec 20, 2018Updated 7 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Test-Case Prioritization for Configuration Testing☆16Jul 19, 2021Updated 4 years ago
- LLVM DSA fork for SeaHorn☆21Aug 17, 2019Updated 6 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Nov 24, 2021Updated 4 years ago
- Code for paper "Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers"☆17Jan 27, 2023Updated 3 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- ☆199Sep 22, 2023Updated 2 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Apr 8, 2018Updated 7 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Jun 10, 2017Updated 8 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- ☆46Sep 24, 2023Updated 2 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- Programs generated by ChatGPT☆27Jul 19, 2023Updated 2 years ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated 11 months ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago