Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf
☆28Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for verified-global-properties
Users that are interested in verified-global-properties are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆30Dec 27, 2021Updated 4 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- Library for training globally-robust neural networks.☆31Aug 7, 2025Updated 7 months ago
- Certifying Geometric Robustness of Neural Networks☆16Mar 24, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- DeepInspect code release☆11Feb 11, 2020Updated 6 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69May 31, 2024Updated last year
- Code from PLDI '21 paper "Provable Repair of Deep Neural Networks."☆10Nov 26, 2022Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- Private Adaptive Optimization with Side Information (ICML '22)☆16Jun 23, 2022Updated 3 years ago
- ☆11Apr 23, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- just like the shell command ls, which is realized by C.☆14Dec 29, 2011Updated 14 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆121Apr 4, 2023Updated 2 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- [ICML 2022] Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum☆11Jul 15, 2022Updated 3 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Mar 24, 2023Updated 3 years ago
- EMS provided by the paper "EMS: History-Driven Mutation for Coverage-based Fuzzing"☆34Nov 4, 2022Updated 3 years ago
- Vulnerable Source Code Collected from Open Source Repositories for Dataset Generation☆17Dec 3, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Dec 3, 2021Updated 4 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Mar 17, 2026Updated last week
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆58Apr 1, 2024Updated last year
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- Mutation-based implementation of a random equivalence testing strategy for active automata learning☆16Dec 20, 2018Updated 7 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- SyReNN: Symbolic Representations for Neural Networks☆41Mar 20, 2023Updated 3 years ago
- ☆87Nov 5, 2024Updated last year
- Official implementation of "When Machine Unlearning Jeopardizes Privacy" (ACM CCS 2021)☆50May 20, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- Open source release from our ICLR 2020 paper, CLN2INV: Learning Loop Invariants with Continuous Logic Networks.☆21Jun 8, 2020Updated 5 years ago
- Root Repo for the RLBox Sandboxing Library Research prototype. Note: this is the original research prototype for this library. For the pr…☆24Sep 14, 2023Updated 2 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- alpha-beta-CROWN: An Efficient, Scalable and GPU Accelerated Neural Network Verifier (winner of VNN-COMP 2021, 2022, 2023, 2024, 2025)☆354Jan 17, 2026Updated 2 months ago