Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for jupyter notebook attack
attack
x
jupyter-notebook
x
106 search results found
One Pixel Attack Keras
⭐
1,078
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
Obfuscated Gradients
⭐
846
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Ml_privacy_meter
⭐
501
Privacy Meter: An open-source library to audit data privacy in statistical and machine learning algorithms.
Advhat
⭐
266
AdvHat: Real-world adversarial attack on ArcFace Face ID system
2019 Scalingattack
⭐
151
Image-Scaling Attacks and Defenses
Amitt
⭐
138
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
Nlp_adversarial_examples
⭐
112
Implementation code for the paper "Generating Natural Language Adversarial Examples"
Ripple
⭐
104
Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)
Hai
⭐
97
HIL-based Augmented ICS (HAI) Security Dataset
Kdd Cup 99 Spark
⭐
87
PySpark solution to the KDDCup99
Robust Physical Attack
⭐
82
Physical adversarial attack for fooling the Faster R-CNN object detector
Phishing Website Detection
⭐
78
It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Python
Tog
⭐
74
Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While DNN-powered object detection systems celebrate many life-enriching opportunities, they also open doors for misuse and abuse. This project presents a suite of adversarial objectness gradient attacks, coined as TOG, which can cause the state-of-the-art deep object detection networks to suffer from untargeted random attacks or even targeted attacks with three types
Adversarial Learning Robustness
⭐
71
Contains materials for workshops pertaining to adversarial robustness in deep learning.
Anomaly Reactionrl
⭐
69
Using RL for anomaly detection in NSL-KDD
Nsl Kdd
⭐
63
PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html
Phr Model
⭐
59
Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
Cyphercat
⭐
57
Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking attacks and defenses.
Pixel Deflection
⭐
54
Deflecting Adversarial Attacks with Pixel Deflection
Fooling Lime Shap
⭐
47
Adversarial Attacks on Post Hoc Explanation Techniques (LIME/SHAP)
Adversarial_lab
⭐
45
Web-based Tool for visualisation and generation of adversarial examples by attacking ImageNet Models like VGG, AlexNet, ResNet etc.
Procedural Advml
⭐
40
Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Adversarial Medicine
⭐
38
Code for the paper "Adversarial Attacks Against Medical Deep Learning Systems"
Mitre Attack Api
⭐
35
Python module to interact with the MITRE attack framework via the MITRE API
Attackbox
⭐
33
Gal
⭐
31
[ICML 2021] Information Obfuscation of Graph Neural Networks
Ijcnn19attacks
⭐
29
Adversarial Attacks on Deep Neural Networks for Time Series Classification
Security And Robustness Of Deep Learning In Wireless Communication Systems
⭐
26
A research oriented repository on the Security and Robustness of Deep Learning for Wireless Communication Systems
Advanced Gradient Obfuscating
⭐
25
Take further steps in the arms race of adversarial examples with only preprocessing.
Ics Evasion Attacks
⭐
23
Public Code for ICS Evasion Attack Generation
Data Poisoning Release
⭐
23
Adversarial Examples
⭐
23
Adversarial Examples: Attacks and Defenses for Deep Learning
Tianchi_blackboxadversial
⭐
22
安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place
Bothound
⭐
22
Automatic attack detector and botnet classifier
Complete_cybersecurity_path
⭐
22
the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine learning and cybersecurity. for more info about theis path :- https://www.sans.org/cyber-security-skills-roadmap
Low Frequency Adversarial
⭐
20
Pickle Fuzz
⭐
18
Attempts at fuzzing Python unpicklers
Predicting Terrorist Attacks
⭐
18
Predicting terrorist attacks using the Global Terrorism Database (GTD).
Breaking Poisoned Classifier
⭐
17
Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"
Martianhacks
⭐
17
A jupyter notebook that contains the main commands executed during a penetration test
Probingdataset
⭐
16
Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan
Revisit_adv_rec
⭐
16
A PyTorch implementation for the Recsys 2020 paper: Revisiting Adversarially Learned Injection Attacks Against Recommender Systems
Adversedrive
⭐
16
Attacking Vision based Perception in End-to-end Autonomous Driving Models
Visualization Of Global Terrorism Database
⭐
16
📊 Visualization of GTD with py Plotly lib, including amazing graphs and animation 📼
Bluff
⭐
16
Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Intrusion Detection Big Data
⭐
15
Advml Traffic Sign
⭐
15
Code for the 'DARTS: Deceiving Autonomous Cars with Toxic Signs' paper
Interpretationfragility
⭐
14
Interpretation of Neural Network is Fragile
Advpc
⭐
14
AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)
Mcs2018_solution
⭐
14
Splitnn_fsha
⭐
13
Pgd Pytorch
⭐
13
A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"
Robust Attribution Regularization
⭐
13
Robust Attribution Regularization
Dr_cvpr20
⭐
13
Secml
⭐
12
Security Weaknesses in Machine Learning
Interpretable_cnns_via_feedforward_design
⭐
12
Official Implementation for FF_designed CNNs
Ddosmitigation
⭐
12
Adaptive Pushback Mechanism for DDoS Detection and Mitigation employing P4 Data Planes
Interpretable_cnn
⭐
12
This repository is deprecated, please go to https://github.com/davidsonic/Interpretable_CNNs_v
Edge2guard
⭐
12
Code for PerCom Workshop paper title 'Edge2Guard: Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices'
Epanetcpa
⭐
12
epanetCPA is a MATLAB® toolbox for assessing the impacts of cyber-physical attacks on water distribution systems
Privgan
⭐
11
PrivGAN: Protecting GANs from membership inference attacks at low cost
Network Log And Traffic Analysis
⭐
11
Identify malicious behavior and attacks using Machine Learning with Python
Bayesian Adversarial Learning
⭐
11
Nattack
⭐
10
Ml Ids
⭐
10
A machine learning based Intrusion Detection System
Manifoldmixup
⭐
10
ManifoldMixup with support for Interpolated Adversarial training
Adversarial
⭐
10
Creating and defending against adversarial examples
Capsnet Adversarial
⭐
9
Capsule networks can defend against adversarial attacks using reconstruction error
Biometric Backdoors
⭐
9
Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"
Adversarial_signatures
⭐
9
Characterizing and evaluating adversarial examples for Offline Handwritten Signature Verification
Kervolution Under Adversarial Attack Pytorch
⭐
9
implement Kervolutional Neural Networks (CVPR, 2019) and compare with CNN under the white box attack
Iterativesalienceocclusion
⭐
9
Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks
Snn Adversarial Attacks
⭐
9
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Kirv
⭐
8
Materials for the Cryptography and computer security course
Universal_attack_natural_trigger
⭐
8
Natural Universal Trigger Search (NUTS)
Blockchain_big_bang
⭐
8
Studying the upper bound on allowed block size increases under the current dynamic algorithm.
Knn Defense
⭐
8
Adversarial Examples on KNN (and its neural network friends)
Data Poisoning Journal Release
⭐
8
Securing Your Ai And Machine Learning Systems
⭐
8
Graphleaks
⭐
8
Code for the paper "Quantifying Privacy Leakage in Graph Embedding" published in MobiQuitous 2020
Building Intrusion Detection System
⭐
8
Building Intrusion Detection System for Network Security Using the KD99 Data Set
Strip
⭐
7
This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"
Atgan
⭐
7
GAN for adversarial attacks; CSC2541 project.
Adversarial Sentiment Classification
⭐
7
Adversarial attack on sentiment classification task.
Attack And Anomaly Detection In Iot Sensors In Iot Sites Using Machine Learning Approaches
⭐
6
Attack and Anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased use of IoT infrastructure in every domain, threats and attacks in these infrastructures are also growing commensurately. Denial of Service, Data Type Probing, Malicious Control, Malicious Operation, Scan, Spying and Wrong Setup are such attacks and anomalies which can cause an IoT system failure. In this paper, performances of several machine learning models ha
Subspace Attack Reproduction
⭐
6
Attempt to reproduce the paper Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks.
Adversarial Attacks In Pytorch Example
⭐
6
Fast Gradient Sign Method and Iterative Least-Likely Class, using LeNet and DenseNet in PyTorch
Heart Attack Prediction
⭐
6
Using Machine Learning models to effectively predict heart attacks before they happen using data easily obtainable from a standard doctor's appointment
Pokemon
⭐
6
R analysis on the Pokemon data
Ids
⭐
6
ML based intrusion detection system
Integration Of Adversarial Attacks In Training Pipeline
⭐
6
Use a Jupyter notebook to integrate the Adversarial Robustness Toolbox (ART) into a neural network model training pipeline with Fabric for Deep Learning to find model vulnerabilities.
Iot Botnet Attack Detection
⭐
6
Botnet detection on IoT Devices
Cw Pytorch
⭐
6
A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"
Weikun Zhengshuang
⭐
6
over-the-air_speech_recogniztion_attack
Pakistan Suicide Bombing Dataset
⭐
6
Analyzing the Suicide Bombing Patterns and seeking some of the most tangled questions with good visualizations with the help of Machine Learning and Data Science.
Gan Balancing Datasets
⭐
5
COSC 490 Towson University
Deepdefense
⭐
5
DDoS attack detection using BLSTM based RNN
Ddosm P4
⭐
5
Offloading Real-time DDoS Attack Mitigation to Programmable Data Planes
Paperlm1
⭐
5
Understanding_adversarial_examples
⭐
5
A jupyter notebook containing a walkthrough of how gradient based adversarial attacks work in 2 dimensions - Including both a white-box and black-box attack.
Related Searches
Python Jupyter Notebook (12,976)
Jupyter Notebook Machine Learning (8,463)
Jupyter Notebook Dataset (6,824)
Jupyter Notebook Deep Learning (6,566)
Jupyter Notebook Tensorflow (4,771)
Jupyter Notebook Data Science (4,256)
Jupyter Notebook Convolutional Neural Networks (4,218)
Jupyter Notebook Classification (3,939)
Jupyter Notebook Neural (3,926)
Jupyter Notebook Pytorch (3,877)
1-100 of 106 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.