All Projects → FeatureScatter → Similar Projects or Alternatives

48 Open source projects that are alternatives of or similar to FeatureScatter

Adversarial-Patch-Training
Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.
Stars: ✭ 30 (-53.12%)
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+28.13%)
EAD Attack
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Stars: ✭ 34 (-46.87%)
Adversarial-Distributional-Training
Adversarial Distributional Training (NeurIPS 2020)
Stars: ✭ 52 (-18.75%)
translearn
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Stars: ✭ 18 (-71.87%)
adversarial-code-generation
Source code for the ICLR 2021 work "Generating Adversarial Computer Programs using Optimized Obfuscations"
Stars: ✭ 16 (-75%)
BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (-48.44%)
Mutual labels:  defense
adversarial-recommender-systems-survey
The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., attacking and defense recommendation models), (ii) to show another successful application of AML in generative adversarial networks (GANs) for generative applications, thanks to their ability for learning (high-…
Stars: ✭ 110 (+71.88%)
AdMRL
Code for paper "Model-based Adversarial Meta-Reinforcement Learning" (https://arxiv.org/abs/2006.08875)
Stars: ✭ 30 (-53.12%)
Mutual labels:  adversarial-training
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+60.94%)
Mutual labels:  defense
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+79.69%)
Mutual labels:  defense
AdverseDrive
Attacking Vision based Perception in End-to-end Autonomous Driving Models
Stars: ✭ 24 (-62.5%)
gamechanger
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 27 (-57.81%)
Mutual labels:  defense
AWP
Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"
Stars: ✭ 114 (+78.13%)
Mutual labels:  adversarial-training
procedural-advml
Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Stars: ✭ 47 (-26.56%)
MSF-Self-Defence
Self defense post module for metasploit
Stars: ✭ 18 (-71.87%)
Mutual labels:  defense
KitanaQA
KitanaQA: Adversarial training and data augmentation for neural question-answering models
Stars: ✭ 58 (-9.37%)
Mutual labels:  adversarial-training
ThermometerEncoding
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch
Stars: ✭ 15 (-76.56%)
cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+64.06%)
Mutual labels:  defense
athena
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Stars: ✭ 39 (-39.06%)
denoised-smoothing
Provably defending pretrained classifiers including the Azure, Google, AWS, and Clarifai APIs
Stars: ✭ 82 (+28.13%)
Mutual labels:  adversarial-robustness
Portforge
Lightweight utility to fool port scanners
Stars: ✭ 23 (-64.06%)
Mutual labels:  defense
perceptron-benchmark
Robustness benchmark for DNN models.
Stars: ✭ 61 (-4.69%)
phpwaf-phanalyzer
AliGuard PHP WAF
Stars: ✭ 12 (-81.25%)
Mutual labels:  defense
SWELF
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-64.06%)
Mutual labels:  defense
Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+215.63%)
Mutual labels:  defense
satellite-placement
Group satellites into constellations such that their average observation coverage is maximized
Stars: ✭ 20 (-68.75%)
Mutual labels:  defense
synthesizing-robust-adversarial-examples
My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-AW
Stars: ✭ 60 (-6.25%)
headers
An application to catch, search and analyze HTTP secure headers.
Stars: ✭ 59 (-7.81%)
Mutual labels:  defense
alldaydevops-aism
All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)
Stars: ✭ 21 (-67.19%)
Mutual labels:  defense
Personal Security Checklist
🔒 A curated checklist of 300+ tips for protecting digital security and privacy in 2021
Stars: ✭ 2,388 (+3631.25%)
Mutual labels:  defense
In0ri
Defacement detection with deep learning
Stars: ✭ 35 (-45.31%)
Mutual labels:  defense
gamechanger-data
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 17 (-73.44%)
Mutual labels:  defense
shellsum
A defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-53.12%)
Mutual labels:  defense
structural-imbalance
Demo for analyzing the structural imbalance on a signed social network.
Stars: ✭ 22 (-65.62%)
Mutual labels:  defense
Adversarial Robustness Toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+4021.88%)
Fawkes
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Stars: ✭ 4,362 (+6715.63%)
advrank
Adversarial Ranking Attack and Defense, ECCV, 2020.
Stars: ✭ 19 (-70.31%)
AMR
This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversarial Training Towards Robust Multimedia Recommender System.
Stars: ✭ 30 (-53.12%)
backdoors101
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Stars: ✭ 181 (+182.81%)
awesome-machine-learning-reliability
A curated list of awesome resources regarding machine learning reliability.
Stars: ✭ 31 (-51.56%)
tulip
Scaleable input gradient regularization
Stars: ✭ 19 (-70.31%)
robust-local-lipschitz
A Closer Look at Accuracy vs. Robustness
Stars: ✭ 75 (+17.19%)
domain-shift-robustness
Code for the paper "Addressing Model Vulnerability to Distributional Shifts over Image Transformation Sets", ICCV 2019
Stars: ✭ 22 (-65.62%)
Mutual labels:  adversarial-training
consistency-adversarial
Consistency Regularization for Adversarial Robustness (AAAI 2022)
Stars: ✭ 37 (-42.19%)
Mutual labels:  adversarial-training
Robust-Semantic-Segmentation
Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic Segmentation (ICCV2021)
Stars: ✭ 25 (-60.94%)
Mutual labels:  adversarial-training
adan
Language-Adversarial Training for Cross-Lingual Text Classification (TACL)
Stars: ✭ 60 (-6.25%)
Mutual labels:  adversarial-training
square-attack
Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]
Stars: ✭ 89 (+39.06%)
Mutual labels:  adversarial-robustness
1-48 of 48 similar projects