twosixlabs / armory
ARMORY Adversarial Robustness Evaluation Test Bed
☆180Updated last year
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆123Updated 3 years ago
- A Python library for Secure and Explainable Machine Learning☆176Updated 3 months ago
- Privacy Testing for Deep Learning☆204Updated last year
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆77Updated last year
- Example external repository for interacting with armory.☆11Updated 3 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆187Updated 2 years ago
- A unified benchmark problem for data poisoning attacks☆155Updated last year
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆255Updated 4 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆209Updated 4 months ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆99Updated 2 years ago
- ☆144Updated 7 months ago
- Copycat CNN☆27Updated last year
- Knockoff Nets: Stealing Functionality of Black-Box Models☆96Updated 2 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆86Updated 7 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆61Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 2 years ago
- ☆40Updated last year
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆219Updated 9 months ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆58Updated 5 years ago
- Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.☆62Updated 5 years ago
- A curated list of academic events on AI Security & Privacy☆150Updated 8 months ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆198Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 7 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆109Updated 7 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆164Updated 4 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆102Updated 8 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last week