twosixlabs / armoryLinks
ARMORY Adversarial Robustness Evaluation Test Bed
☆183Updated last year
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ☆128Updated 3 years ago
- A Python library for Secure and Explainable Machine Learning☆185Updated 2 months ago
- Privacy Testing for Deep Learning☆211Updated 2 years ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆211Updated 2 months ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆79Updated 2 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated 2 years ago
- Example external repository for interacting with armory.☆11Updated 3 years ago
- A unified benchmark problem for data poisoning attacks☆157Updated last year
- Copycat CNN☆27Updated last year
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆255Updated 4 years ago
- A curated list of academic events on AI Security & Privacy☆160Updated last year
- ☆147Updated 10 months ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆221Updated last year
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 3 months ago
- ☆23Updated 3 years ago
- a CLI that provides a generic automation layer for assessing the security of ML models☆879Updated last month
- 💡 Adversarial attacks on explanations and how to defend them☆325Updated 9 months ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆161Updated last week
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 2 years ago
- Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.☆62Updated 6 years ago
- ☆98Updated 4 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆105Updated 2 years ago
- ☆86Updated last year
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆60Updated 6 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 3 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆108Updated last year
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆88Updated 7 years ago