All Projects → TIGER → Similar Projects or Alternatives

737 Open source projects that are alternatives of or similar to TIGER

Pro-GNN
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Stars: ✭ 202 (+96.12%)
SimP-GCN
Implementation of the WSDM 2021 paper "Node Similarity Preserving Graph Convolutional Networks"
Stars: ✭ 43 (-58.25%)
DiagnoseRE
Source code and dataset for the CCKS201 paper "On Robustness and Bias Analysis of BERT-based Relation Extraction"
Stars: ✭ 23 (-77.67%)
Mutual labels:  robustness, adversarial-attacks
PracticalMachineLearning
A collection of ML related stuff including notebooks, codes and a curated list of various useful resources such as books and softwares. Almost everything mentioned here is free (as speech not free food) or open-source.
Stars: ✭ 60 (-41.75%)
Mutual labels:  data-mining, graph-mining
s-attack
[CVPR 2022] S-attack library. Official implementation of two papers "Vehicle trajectory prediction works, but not everywhere" and "Are socially-aware trajectory prediction models really socially-aware?".
Stars: ✭ 51 (-50.49%)
Mutual labels:  robustness, adversarial-attacks
RayS
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-58.25%)
Mutual labels:  attack, robustness
Adversarial Robustness Toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+2461.17%)
Mutual labels:  attack, adversarial-attacks
perceptual-advex
Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".
Stars: ✭ 44 (-57.28%)
Mutual labels:  robustness, adversarial-attacks
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-20.39%)
Mutual labels:  attack, defense
Nonce Disrespect
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+0%)
Mutual labels:  attack, vulnerability
square-attack
Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]
Stars: ✭ 89 (-13.59%)
Mutual labels:  robustness, adversarial-attacks
T3
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-75.73%)
Mutual labels:  attack, adversarial-attacks
pathpy
pathpy is an OpenSource python package for the modeling and analysis of pathways and temporal networks using higher-order and multi-order graphical models
Stars: ✭ 124 (+20.39%)
Mutual labels:  data-mining, networks
Singularity
A DNS rebinding attack framework.
Stars: ✭ 621 (+502.91%)
Mutual labels:  attack, vulnerability
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+37.86%)
Mutual labels:  attack, vulnerability
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+300.97%)
Mutual labels:  attack, vulnerability
POPQORN
An Algorithm to Quantify Robustness of Recurrent Neural Networks
Stars: ✭ 44 (-57.28%)
Mutual labels:  robustness, adversarial-attacks
cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+1.94%)
Mutual labels:  vulnerability, defense
bookworm
📚 social networks from novels
Stars: ✭ 72 (-30.1%)
Mutual labels:  data-mining
rubysec.github.io
Current home of rubysec.com
Stars: ✭ 25 (-75.73%)
Mutual labels:  vulnerability
graphml-tutorials
Tutorials for Machine Learning on Graphs
Stars: ✭ 125 (+21.36%)
Mutual labels:  networks
ECG analysis
No description or website provided.
Stars: ✭ 32 (-68.93%)
Mutual labels:  data-mining
Python-For-Ethical-Hacking
This is a complete project series on implementing hacking tools available in Kali Linux into python.
Stars: ✭ 29 (-71.84%)
Mutual labels:  vulnerability
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-54.37%)
Mutual labels:  attack
hard-label-attack
Natural Language Attacks in a Hard Label Black Box Setting.
Stars: ✭ 26 (-74.76%)
Mutual labels:  adversarial-attacks
cytoscape-sbgn-stylesheet
View biological networks via Cytoscape.js and sbgn-ml
Stars: ✭ 47 (-54.37%)
Mutual labels:  networks
CVE-2021-43798
CVE-2021-43798:Grafana 任意文件读取漏洞
Stars: ✭ 27 (-73.79%)
Mutual labels:  vulnerability
nsa-codebreaker-2020
My solutions to the 2020 NSA Codebreaker Challenge
Stars: ✭ 69 (-33.01%)
Mutual labels:  vulnerability
trojanzoo
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Stars: ✭ 178 (+72.82%)
Mutual labels:  adversarial-attacks
Data-Mining-and-Warehousing
Data Mining algorithms for IDMW632C course at IIIT Allahabad, 6th semester
Stars: ✭ 19 (-81.55%)
Mutual labels:  data-mining
chop
CHOP: An optimization library based on PyTorch, with applications to adversarial examples and structured neural network training.
Stars: ✭ 68 (-33.98%)
Mutual labels:  adversarial-attacks
REW-sploit
Emulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+11.65%)
Mutual labels:  defense
pollinations
Generate Art
Stars: ✭ 100 (-2.91%)
Mutual labels:  diffusion
scan-cli-plugin
Docker Scan is a Command Line Interface to run vulnerability detection on your Dockerfiles and Docker images
Stars: ✭ 135 (+31.07%)
Mutual labels:  vulnerability
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-75.73%)
Mutual labels:  attack
covid-xprize
Open-source repository containing examples and documentation for the Cognizant XPRIZE Pandemic Response Challenge
Stars: ✭ 36 (-65.05%)
Mutual labels:  epidemics
advisories
A collection of my public security advisories.
Stars: ✭ 16 (-84.47%)
Mutual labels:  vulnerability
modelscript
REPO MOVED TO https://github.com/repetere/jsonstack-data - Data Science and Machine learning in JavaScript
Stars: ✭ 40 (-61.17%)
Mutual labels:  data-mining
multiscorer
A module for allowing the use of multiple metric functions in scikit's cross_val_score
Stars: ✭ 21 (-79.61%)
Mutual labels:  data-mining
hh research
Автоматизация поиска и исследования вакансий с сайта hh.ru (Headhunter) с помощью методов Python. Классификация данных, поиск статистических параметров.
Stars: ✭ 36 (-65.05%)
Mutual labels:  data-mining
PGD-pytorch
A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"
Stars: ✭ 83 (-19.42%)
Mutual labels:  adversarial-attacks
spring-boot-upload-file-lead-to-rce-tricks
spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧
Stars: ✭ 517 (+401.94%)
Mutual labels:  vulnerability
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-66.99%)
Mutual labels:  attack
raptor infiltrate20
#INFILTRATE20 raptor's party pack
Stars: ✭ 24 (-76.7%)
Mutual labels:  vulnerability
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-50.49%)
Mutual labels:  vulnerability
old nesta daps
[archived]
Stars: ✭ 16 (-84.47%)
Mutual labels:  data-mining
gamechanger
GAMECHANGER aspires to be the Department’s trusted solution for evidence-based, data-driven decision-making across the universe of DoD requirements
Stars: ✭ 27 (-73.79%)
Mutual labels:  defense
MSF-Self-Defence
Self defense post module for metasploit
Stars: ✭ 18 (-82.52%)
Mutual labels:  defense
BigCLAM-ApacheSpark
Overlapping community detection in Large-Scale Networks using BigCLAM model build on Apache Spark
Stars: ✭ 40 (-61.17%)
Mutual labels:  graph-mining
autoindex
PHP - Automatically add an "index.php" in all directories recursively
Stars: ✭ 25 (-75.73%)
Mutual labels:  vulnerability
DUN
Code for "Depth Uncertainty in Neural Networks" (https://arxiv.org/abs/2006.08437)
Stars: ✭ 65 (-36.89%)
Mutual labels:  robustness
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-27.18%)
Mutual labels:  attack
heidi
heidi : tidy data in Haskell
Stars: ✭ 24 (-76.7%)
Mutual labels:  data-mining
gosquito
gosquito ("go" + "mosquito") is a pluggable tool for data gathering, data processing and data transmitting to various destinations.
Stars: ✭ 25 (-75.73%)
Mutual labels:  data-mining
rumor-fake-news-papers
🚨 Rumor, Fake News, Misinformation Papers
Stars: ✭ 35 (-66.02%)
Mutual labels:  data-mining
Algorithmic-Trading
Algorithmic trading using machine learning.
Stars: ✭ 102 (-0.97%)
Mutual labels:  data-mining
AWP
Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"
Stars: ✭ 114 (+10.68%)
Mutual labels:  adversarial-attacks
KitanaQA
KitanaQA: Adversarial training and data augmentation for neural question-answering models
Stars: ✭ 58 (-43.69%)
Mutual labels:  adversarial-attacks
non-api-fb-scraper
Scrape public FaceBook posts from any group or user into a .csv file without needing to register for any API access
Stars: ✭ 40 (-61.17%)
Mutual labels:  data-mining
cumulus
Cumulus is web application weakness monitoring, it would be working by add just 3 codelines
Stars: ✭ 43 (-58.25%)
Mutual labels:  vulnerability
1-60 of 737 similar projects