twosixlabs / armoryView external linksLinks
ARMORY Adversarial Robustness Evaluation Test Bed
☆189Jan 19, 2024Updated 2 years ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆130Dec 21, 2021Updated 4 years ago
- Example external repository for interacting with armory.☆11May 2, 2022Updated 3 years ago
- Python library for Adversarial ML Evaluation☆25Jul 14, 2025Updated 6 months ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,821Dec 12, 2025Updated 2 months ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆910Jul 18, 2025Updated 6 months ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Jun 12, 2023Updated 2 years ago
- Official Repository for the CVPR 2020 AdvML Workshop paper "Role of Spatial Context in Adversarial Robustness for Object Detection"☆36Jun 23, 2020Updated 5 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- Minimum viable code for the Decodable Information Bottleneck paper. Pytorch Implementation.☆11Oct 20, 2020Updated 5 years ago
- Distributionally Robust Learning in PyTorch. Install with `pip install sqwash`.☆12Oct 6, 2023Updated 2 years ago
- QED-C: The Quantum Economic Development Consortium provides these computer programs and software for use in the fields of quantum science…☆16Dec 13, 2025Updated 2 months ago
- [ICML 2022] Robust Deep Reinforcement Learning through Bootstrapped Opportunistic Curriculum☆10Jul 15, 2022Updated 3 years ago
- A library for experimenting with, training and evaluating neural networks, with a focus on adversarial robustness.☆944Jan 11, 2024Updated 2 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated last year
- Reference implementations for RecurJac, CROWN, FastLin and FastLip (Neural Network verification and robustness certification algorithms)…☆27Nov 23, 2019Updated 6 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Dec 17, 2021Updated 4 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆768Mar 31, 2025Updated 10 months ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- ☆29Jul 6, 2017Updated 8 years ago
- [DEPRECATED] A Quantum Hardware Abstraction Layer developed in the context of UK ISCF consortium☆16Mar 10, 2022Updated 3 years ago
- Send high priority Deep Security events to the AWS Security Hub☆14Jul 31, 2019Updated 6 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated this week
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Jul 6, 2025Updated 7 months ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,938Dec 3, 2025Updated 2 months ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,410Apr 10, 2024Updated last year
- auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs☆338Feb 3, 2026Updated last week
- ☆34Aug 30, 2021Updated 4 years ago
- Awesomeish readme (and maybe tools) for gathering resources around the HackRF One device☆15Jan 25, 2021Updated 5 years ago
- ☆16May 30, 2024Updated last year
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- A repository of tools for verifying constant-timeness☆19Feb 4, 2026Updated last week
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆29Jun 24, 2025Updated 7 months ago
- Provably defending pretrained classifiers including the Azure, Google, AWS, and Clarifai APIs☆102Apr 2, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago