Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models trained on MNIST and CIFAR-10.
☆24Aug 9, 2024Updated last year
Alternatives and similar repositories for Morphence
Users that are interested in Morphence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection of adversarial examples using influence functions and nearest neighbors☆38Nov 22, 2022Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆14Aug 22, 2022Updated 3 years ago
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Mar 18, 2018Updated 8 years ago
- [Findings of EMNLP 2022] Expose Backdoors on the Way: A Feature-Based Efficient Defense against Textual Backdoor Attacks☆13Feb 26, 2023Updated 3 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Official implementation for paper "FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning" (NeurIPS 2023).☆13Oct 25, 2024Updated last year
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆14Nov 27, 2023Updated 2 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- 天池比赛-铝型材表面瑕疵识别的实现;Pytorch;finetune renet;☆15Oct 27, 2018Updated 7 years ago
- ☆12Jan 28, 2023Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆26Jan 28, 2021Updated 5 years ago
- KNN Defense Against Clean Label Poisoning Attacks☆13Sep 24, 2021Updated 4 years ago
- ☆17Apr 22, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool for roof defect recognition☆13May 14, 2020Updated 5 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- FedDefender is a novel defense mechanism designed to safeguard Federated Learning from the poisoning attacks (i.e., backdoor attacks).☆16Jul 6, 2024Updated last year
- ☆22Apr 15, 2022Updated 4 years ago
- Benchopt benchmark for ResNet fitting on a classification task☆12Sep 19, 2023Updated 2 years ago
- ☆10Mar 8, 2025Updated last year
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆15Jul 13, 2022Updated 3 years ago
- Source code of our submission (Rank 2) for Semi-Supervised Domain Adaptation task in VisDA-2019☆16Oct 10, 2019Updated 6 years ago
- ☆47Feb 13, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Research and experimental code related to Opacus, an open-source library for training PyTorch models with Differential Privacy☆18Oct 9, 2024Updated last year
- Example external repository for interacting with armory.☆11May 2, 2022Updated 4 years ago
- [AIR-DISCOVER Summer Research] Multi-class Anomaly Detection Transformer with Heterogenous Knowledge Distillation☆14Nov 11, 2024Updated last year
- Code for the paper titled "Generalized Depthwise-Separable Convolutions for Adversarially Robust and Efficient Neural Networks" (NeurIPS…☆11Jan 7, 2022Updated 4 years ago
- Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks☆13Feb 15, 2022Updated 4 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- This is the implementation of Autonomous Deep Learning on python☆12Jul 21, 2020Updated 5 years ago
- Source code for Jellyfish, a soft real-time inference serving system☆15Dec 20, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆21Oct 13, 2023Updated 2 years ago
- Python wrapper for Time Warped Edit Distance☆18Jan 18, 2021Updated 5 years ago
- This repository is related to the paper titled "Detecting Out-of-Distribution Inputs in Deep Neural Networks Using an Early-Layer Output"…☆12Apr 14, 2023Updated 3 years ago
- SAGA: A Security Architecture for Governing AI Agentic Systems☆21Feb 17, 2026Updated 2 months ago
- [NeurIPS 2021] "Drawing Robust Scratch Tickets: Subnetworks with Inborn Robustness Are Found within Randomly Initialized Networks" by Yon…☆13Feb 13, 2022Updated 4 years ago
- Adversarial attacks and defenses against federated learning.☆20May 24, 2023Updated 2 years ago
- ☆25May 20, 2020Updated 5 years ago