twosixlabs / armoryLinks
ARMORY Adversarial Robustness Evaluation Test Bed
☆188Updated 2 years ago
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆130Updated 4 years ago
- A Python library for Secure and Explainable Machine Learning☆190Updated 7 months ago
- Privacy Testing for Deep Learning☆211Updated 4 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆223Updated last month
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Updated 2 years ago
- Copycat CNN☆28Updated last year
- Example external repository for interacting with armory.☆11Updated 3 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆259Updated 4 years ago
- A curated list of academic events on AI Security & Privacy☆167Updated last year
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated 2 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 6 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated 4 months ago
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- ☆151Updated last year
- 💡 Adversarial attacks on explanations and how to defend them☆333Updated last year
- a CLI that provides a generic automation layer for assessing the security of ML models☆906Updated 6 months ago
- Modular Adversarial Robustness Toolkit☆21Updated 6 months ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆114Updated 3 years ago
- ☆101Updated 5 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆222Updated last year
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Updated 5 months ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆111Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆88Updated 4 years ago
- ☆22Updated 4 years ago
- ☆89Updated 2 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 3 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated 2 weeks ago
- ☆69Updated last year
- Provable adversarial robustness at ImageNet scale☆405Updated 6 years ago