PhD/MSc course on Machine Learning Security (Univ. Cagliari)
☆226Dec 18, 2025Updated 4 months ago
Alternatives and similar repositories for mlsec
Users that are interested in mlsec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- A Python library for Secure and Explainable Machine Learning☆191Jun 23, 2025Updated 9 months ago
- Machine Learning applied to Cyber Security Course☆49Sep 5, 2019Updated 6 years ago
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Jan 11, 2023Updated 3 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Nov 22, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Transformer Neural Network for Dynamic Malware Detection☆40Mar 5, 2026Updated last month
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Mar 16, 2022Updated 4 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆246Nov 27, 2025Updated 4 months ago
- Attack benchmark repository☆23Nov 25, 2025Updated 4 months ago
- ☆43Jan 25, 2024Updated 2 years ago
- ☆19Aug 16, 2021Updated 4 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 2020 Machine Learning Security Evasion Competition☆49Aug 6, 2020Updated 5 years ago
- ☆14Feb 26, 2025Updated last year
- Research prototype of deletion efficient k-means algorithms☆24Dec 19, 2019Updated 6 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- ☆10Dec 4, 2020Updated 5 years ago
- Source code for ICML 2023 paper "Competing for Shareable Arms in Multi-Player Multi-Armed Bandits"☆10May 14, 2024Updated last year
- ☆20Oct 28, 2025Updated 5 months ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- ☆21Nov 6, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- this is a repo for the demo on backdoor attacks on StyleGAN and WaveGAN☆19Aug 4, 2021Updated 4 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆380Feb 5, 2023Updated 3 years ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,925Dec 12, 2025Updated 4 months ago
- A jQuery plugin that allows you to add social buttons in a privacy friendly way☆44Oct 12, 2017Updated 8 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Membership Inference Competition☆32Jun 12, 2023Updated 2 years ago
- Machine Learning & Security Seminar @Purdue University☆25May 9, 2023Updated 2 years ago
- A framework for synthesizing lateral movement login data.☆28May 20, 2021Updated 4 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A curated list of academic events on AI Security & Privacy☆167Aug 22, 2024Updated last year
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆107Apr 22, 2024Updated last year
- ☆11Mar 26, 2018Updated 8 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 4 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆772Mar 31, 2025Updated last year
- 💡 Adversarial attacks on explanations and how to defend them☆335Nov 30, 2024Updated last year