Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for machine learning attack
attack
x
machine-learning
x
69 search results found
Adversarial Robustness Toolbox
⭐
4,420
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Foolbox
⭐
2,600
A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX
Textattack
⭐
2,597
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
One Pixel Attack Keras
⭐
1,078
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
Advmlthreatmatrix
⭐
904
Adversarial Threat Landscape for AI Systems
Deeprobust
⭐
904
A pytorch adversarial library for attack and defense methods on images and graphs
Backdoor Learning Resources
⭐
888
A list of backdoor learning resources
Graph Adversarial Learning Literature
⭐
772
A curated list of adversarial attacks and defenses papers on graph-structured data.
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Ml_privacy_meter
⭐
501
Privacy Meter: An open-source library to audit data privacy in statistical and machine learning algorithms.
Awesome Ml Privacy Attacks
⭐
488
An awesome list of papers on privacy attacks against machine learning
Artificial Adversary
⭐
317
🗣️ Tool to generate adversarial text examples and test machine learning models against them
Awesome Graph Attack Papers
⭐
315
Adversarial attacks and defenses on Graph Neural Networks.
Steal Ml
⭐
250
Model extraction attacks on Machine-Learning-as-a-Service platforms.
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Pro Gnn
⭐
213
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Nettack
⭐
187
Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".
Privacyraven
⭐
172
Privacy Testing for Deep Learning
Secml_malware
⭐
168
Create adversarial attacks against machine learning Windows malware detectors
Robustdg
⭐
160
Toolkit for building machine learning models that generalize to unseen domains and are robust to privacy and other attacks.
Attack And Defense Methods
⭐
152
A curated list of papers on adversarial machine learning (adversarial examples and defense methods).
Adversarial Library
⭐
123
Library containing PyTorch implementations of various adversarial attacks and resources
Fast_adversarial
⭐
118
Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"
Tiger
⭐
108
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Gnn Meta Attack
⭐
106
Implementation of the paper "Adversarial Attacks on Graph Neural Networks via Meta Learning".
Mia
⭐
81
A library for running membership inference attacks against ML models
Urideep
⭐
79
Unicode encoding attacks with machine learning
Phishing Website Detection
⭐
78
It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Python
Disrupting Deepfakes
⭐
75
🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks
Membership Inference
⭐
68
Code for Membership Inference Attack against Machine Learning Models (in Oakland 2017)
Quincy
⭐
67
Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"
Face Robustness Benchmark
⭐
63
An adversarial robustness evaluation library on face recognition.
Robustml
⭐
48
Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.
Fooling Lime Shap
⭐
47
Adversarial Attacks on Post Hoc Explanation Techniques (LIME/SHAP)
Adversarial_lab
⭐
45
Web-based Tool for visualisation and generation of adversarial examples by attacking ImageNet Models like VGG, AlexNet, ResNet etc.
Advis.js
⭐
39
[Tensorflow.js] AdVis: Exploring real-time Adversarial Attacks in the browser with Fast Gradient Sign Method.
Adversarial Vision Challenge
⭐
36
NIPS Adversarial Vision Challenge
Pypuf
⭐
36
Cryptanalysis of Physically Unclonable Functions
Athena
⭐
34
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Acl18_results
⭐
30
Code to reproduce results in our ACL 2018 paper "Did the Model Understand the Question?"
Smartshark
⭐
26
An Intrusion Detection System Based on Machine Learning
Dfst
⭐
23
This is the repository for DFST paper Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Assap
⭐
21
Anti Shoulder Surfing Attack Platform (ASSAP)
Interval Attack
⭐
20
Interval attacks (adversarial ML)
Avc_nips_2018
⭐
19
Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge
Adversedrive
⭐
16
Attacking Vision based Perception in End-to-end Autonomous Driving Models
Mafdet
⭐
15
System that aims to detect and mitigate DDoS attacks using Machine Learning techniques & SDN.
Cs259d_notes_hw
⭐
14
The notes are the supplement to papers and handouts of CS 259D
Robust Attribution Regularization
⭐
13
Robust Attribution Regularization
Adverserial_attack
⭐
12
Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset
Secml
⭐
12
Security Weaknesses in Machine Learning
Cmpt980
⭐
11
This repo provides the code for the CMPT980 course project (DDoS detection and identification using ML)
Ml Ids
⭐
10
A machine learning based Intrusion Detection System
Zeroe
⭐
9
From Hero to Zéroe: A Benchmark of Low-Level Adversarial Attacks
Dos Attack Detection Using Machine Learning
⭐
9
A machine learning program, that detects denial of service attack using machine learning technique.
Web_attack_detection_using_machine_learning
⭐
9
This is a Web Attack Detection Website made using Machine Learning and Django.
Tik_tok
⭐
9
This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in PETS 2020.
Spectre Real Time Detection
⭐
8
This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)
Meta Adversarial Training
⭐
8
Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.
Cyberattack Detection
⭐
8
Cyber Attack Detection thanks to Machine Learning Algorithms
Byzantinemomentum
⭐
8
Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent (ICLR 2021)
Ddos Ml Detection
⭐
8
Detects DDOS attacks using ML
Pytorch Gnn Meta Attack
⭐
8
Pytorch implementation of gnn meta attack (mettack). Paper title: Adversarial Attacks on Graph Neural Networks via Meta Learning.
Linear Region Attack
⭐
8
A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturbations without doing gradient descent
Snort3 Plugin Ml
⭐
8
Adversarial.jl
⭐
7
Adversarial attacks for Neural Networks written with FluxML
Pa Gnn
⭐
7
Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".
Ids
⭐
6
ML based intrusion detection system
Starcraft2 Agent
⭐
6
Starcraft II Agents using PySC2 - StarCraft II Learning Environment
Pakistan Suicide Bombing Dataset
⭐
6
Analyzing the Suicide Bombing Patterns and seeking some of the most tangled questions with good visualizations with the help of Machine Learning and Data Science.
Delayattackdemo
⭐
6
For Delay Attack Demo
Intrusion Detection
⭐
6
Intrusion Detection using various Data Mining Techniques (KDD Cup 1999 Data)
Pixel Discretization
⭐
5
Pixel discretization defense against adversarial attacks
Prada Protecting Against Dnn Model Stealing Attacks
⭐
5
Reference implementation of the PRADA model stealing defense.
Datasets
⭐
5
COMNETS lab dataset is a collection of datasets from the Department of Computer Engineering. Faculty of Computer Science. Universitas Sriwijaya.
Adversarial_robustness_zsl
⭐
5
[ECCV 2020 AROW Workshop] A Deep Dive into Adversarial Robustness in Zero-Shot Learning
Apache Http Logs
⭐
5
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
Adv Examples Fun
⭐
5
Try to generate adversarial images in your browser for fun and profit.
Gan Balancing Datasets
⭐
5
COSC 490 Towson University
Related Searches
Python Machine Learning (14,099)
Jupyter Notebook Machine Learning (12,247)
Machine Learning Neural Network (4,397)
Machine Learning Tensorflow (4,050)
Machine Learning Natural Language Processing (3,891)
Machine Learning Artificial Intelligence (3,877)
Machine Learning Data Science (3,802)
Machine Learning Pytorch (2,910)
Machine Learning Dataset (2,298)
Python Attack (2,252)
1-69 of 69 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.