synthesizing-robust-adversarial-examplesMy entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-AW
Stars: ✭ 60 (+300%)
Mutual labels: adversarial-machine-learning, adversarial-example
EAD AttackEAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Stars: ✭ 34 (+126.67%)
Mutual labels: adversarial-machine-learning
AdverseDriveAttacking Vision based Perception in End-to-end Autonomous Driving Models
Stars: ✭ 24 (+60%)
Mutual labels: adversarial-machine-learning
backdoors101Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Stars: ✭ 181 (+1106.67%)
Mutual labels: adversarial-machine-learning
adversarial-code-generationSource code for the ICLR 2021 work "Generating Adversarial Computer Programs using Optimized Obfuscations"
Stars: ✭ 16 (+6.67%)
Mutual labels: adversarial-machine-learning
AMRThis is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversarial Training Towards Robust Multimedia Recommender System.
Stars: ✭ 30 (+100%)
Mutual labels: adversarial-machine-learning
Adversarial-Patch-TrainingCode for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.
Stars: ✭ 30 (+100%)
Mutual labels: adversarial-machine-learning
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+446.67%)
Mutual labels: adversarial-machine-learning
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+17486.67%)
Mutual labels: adversarial-machine-learning
tulipScaleable input gradient regularization
Stars: ✭ 19 (+26.67%)
Mutual labels: adversarial-machine-learning
translearnCode implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Stars: ✭ 18 (+20%)
Mutual labels: adversarial-machine-learning
advrankAdversarial Ranking Attack and Defense, ECCV, 2020.
Stars: ✭ 19 (+26.67%)
Mutual labels: adversarial-machine-learning
adversarial-recommender-systems-surveyThe goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., attacking and defense recommendation models), (ii) to show another successful application of AML in generative adversarial networks (GANs) for generative applications, thanks to their ability for learning (high-…
Stars: ✭ 110 (+633.33%)
Mutual labels: adversarial-machine-learning
robust-local-lipschitzA Closer Look at Accuracy vs. Robustness
Stars: ✭ 75 (+400%)
Mutual labels: adversarial-machine-learning
procedural-advmlTask-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Stars: ✭ 47 (+213.33%)
Mutual labels: adversarial-machine-learning
athenaAthena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Stars: ✭ 39 (+160%)
Mutual labels: adversarial-machine-learning
perceptron-benchmarkRobustness benchmark for DNN models.
Stars: ✭ 61 (+306.67%)
Mutual labels: adversarial-machine-learning
FawkesFawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Stars: ✭ 4,362 (+28980%)
Mutual labels: adversarial-machine-learning