Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models trained on MNIST and CIFAR-10.
☆23Aug 9, 2024Updated last year
Alternatives and similar repositories for Morphence
Users that are interested in Morphence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 4 months ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆15Nov 27, 2023Updated 2 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- 天池比赛-铝型材表面瑕疵识别的实现;Pytorch;finetune renet;☆15Oct 27, 2018Updated 7 years ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Jul 1, 2023Updated 2 years ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Jul 20, 2023Updated 2 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆26Jan 28, 2021Updated 5 years ago
- KNN Defense Against Clean Label Poisoning Attacks☆13Sep 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 4 years ago
- ☆17Jun 25, 2024Updated last year
- Tool for roof defect recognition☆13May 14, 2020Updated 5 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).☆15Jul 6, 2024Updated last year
- ☆22Apr 15, 2022Updated 3 years ago
- Benchopt benchmark for ResNet fitting on a classification task☆12Sep 19, 2023Updated 2 years ago
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆14Jul 13, 2022Updated 3 years ago
- TextGuard: Provable Defense against Backdoor Attacks on Text Classification☆15Nov 7, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- Sewer-Pipeline-Defect-Identification☆16May 22, 2020Updated 5 years ago
- Example external repository for interacting with armory.☆11May 2, 2022Updated 3 years ago
- Official TensorFlow implementation of GAN-based priors for quantifying uncertainty.☆13Nov 13, 2021Updated 4 years ago
- This repository demonstrates the application of our proposed task-free continual learning method on a synthetic experiment.☆13Jun 24, 2019Updated 6 years ago
- [Pattern Recognition] Official implementation of the paper "CANet: Contextual Information and Spatial Attention Based Network for Detecti…☆20Jul 13, 2024Updated last year
- [AIR-DISCOVER Summer Research] Multi-class Anomaly Detection Transformer with Heterogenous Knowledge Distillation☆14Nov 11, 2024Updated last year
- Code for the paper titled "Generalized Depthwise-Separable Convolutions for Adversarially Robust and Efficient Neural Networks" (NeurIPS…☆11Jan 7, 2022Updated 4 years ago
- ☆14Oct 27, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks☆13Feb 15, 2022Updated 4 years ago
- Source code for Jellyfish, a soft real-time inference serving system☆15Dec 20, 2022Updated 3 years ago
- This is the implementation of Autonomous Deep Learning on python☆12Jul 21, 2020Updated 5 years ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆21Oct 13, 2023Updated 2 years ago
- PyTorch's usage☆16Mar 25, 2023Updated 3 years ago
- Machine learning project, Master's Data Science, 2017☆10Jan 30, 2017Updated 9 years ago
- This repository is related to the paper titled "Detecting Out-of-Distribution Inputs in Deep Neural Networks Using an Early-Layer Output"…☆12Apr 14, 2023Updated 2 years ago