tkuo-tkuo / DeepMutationOperatorsLinks
Developed with the UROP, Detecting Deep Learning Software Defects (Spring 2019), HKUST
☆25Updated 4 years ago
Alternatives and similar repositories for DeepMutationOperators
Users that are interested in DeepMutationOperators are comparing it to the libraries listed below
Sorting:
- ☆25Updated 4 years ago
- Code release of a paper "Guiding Deep Learning System Testing using Surprise Adequacy"☆49Updated 3 years ago
- ☆28Updated 2 years ago
- ☆19Updated 6 years ago
- Code release for RobOT (ICSE'21)☆15Updated 2 years ago
- A systematic testing tool for automatically detecting erroneous behaviors of DNN-driven vehicles☆81Updated 6 years ago
- Concolic Testing for Deep Neural Networks☆119Updated 4 years ago
- DNN Coverage Based Testing Study☆16Updated 5 years ago
- ☆27Updated 5 years ago
- Reward Guided Test Generation for Deep Learning☆21Updated last year
- CC: Causality-Aware Coverage Criterion for Deep Neural Networks☆12Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 7 years ago
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- This is the implement repository of our upcoming ESEC/FSE 2020 paper: Deep Learning Library Testing via Effective Model Generation.☆55Updated 2 years ago
- ☆10Updated 4 years ago
- Testing Deep Neural Networks☆15Updated 7 years ago
- Siren: Byzantine-robust Federated Learning via Proactive Alarming (SoCC '21)☆11Updated last year
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆223Updated 6 years ago
- DeepCrime - Mutation Testing Tool for Deep Learning Systems☆15Updated 2 years ago
- White-box Fairness Testing through Adversarial Sampling☆13Updated 4 years ago
- EvalDNN: A Toolbox for Evaluating Deep Neural Network Models☆16Updated 5 years ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆15Updated last month
- ☆18Updated last year
- ☆20Updated last year
- Tools and data of the paper "Model-based Exploration of the Frontier of Behaviours for Deep Learning System Testing"☆15Updated last year
- ☆10Updated 2 years ago
- ☆124Updated last year
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆53Updated 7 years ago
- ☆19Updated 3 years ago