unica-mlsec / mlsec
PhD/MSc course on Machine Learning Security (Univ. Cagliari)
☆209Updated 4 months ago
Alternatives and similar repositories for mlsec:
Users that are interested in mlsec are comparing it to the libraries listed below
- A Python library for Secure and Explainable Machine Learning☆174Updated 2 months ago
- Privacy Testing for Deep Learning☆202Updated last year
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆49Updated last month
- A curated list of academic events on AI Security & Privacy☆148Updated 8 months ago
- ☆123Updated 3 years ago
- ☆19Updated 3 years ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆78Updated last year
- Create adversarial attacks against machine learning Windows malware detectors☆217Updated last week
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆58Updated 2 years ago
- ☆144Updated 6 months ago
- Papers I have collected and read in undergraduate and graduate period☆50Updated last year
- ARMORY Adversarial Robustness Evaluation Test Bed☆179Updated last year
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Updated last year
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago
- ☆85Updated last year
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆23Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- ☆55Updated 5 years ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆109Updated last year
- 2020 Machine Learning Security Evasion Competition☆49Updated 4 years ago
- ☆24Updated 2 years ago
- 💡 Adversarial attacks on explanations and how to defend them☆314Updated 4 months ago
- Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection☆62Updated 4 years ago
- A curated list of Meachine learning Security & Privacy papers published in security top-4 conferences (IEEE S&P, ACM CCS, USENIX Security…☆259Updated 4 months ago
- ☆22Updated last year
- ☆64Updated 4 years ago
- An awesome list of papers on privacy attacks against machine learning☆597Updated last year
- Security evaluation module with onnx, pytorch, and SecML.☆13Updated 3 years ago
- Code for ML Doctor☆87Updated 8 months ago