Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python adversarial machine learning
adversarial-machine-learning
x
python
x
95 search results found
Fawkes
⭐
4,966
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Adversarial Robustness Toolbox
⭐
4,420
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Textattack
⭐
2,597
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Llm Guard
⭐
567
The Security Toolkit for LLM Interactions
Robustbench
⭐
566
RobustBench: a standardized adversarial robustness benchmark [NeurIPS'21 Benchmarks and Datasets Track]
T2f
⭐
515
T2F: text to face generation using Deep Learning
Pro_gan_pytorch
⭐
504
Unofficial PyTorch implementation of the paper titled "Progressive growing of GANs for improved Quality, Stability, and Variation"
Graphgallery
⭐
440
GraphGallery is a gallery for benchmarking Graph Neural Networks.
Ares
⭐
413
A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.
Auto_lirpa
⭐
239
auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Secml_malware
⭐
168
Create adversarial attacks against machine learning Windows malware detectors
Smoothing Adversarial
⭐
148
Code for our NeurIPS 2019 spotlight "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"
Smoothing
⭐
137
Provable adversarial robustness at ImageNet scale
Vigil Llm
⭐
132
⚡ Vigil ⚡ Detect prompt injections, jailbreaks, and other potentially risky Large Language Model (LLM) inputs
Atnre
⭐
105
Adversarial Training for Neural Relation Extraction
Secml
⭐
100
A Python library for Secure and Explainable Machine Learning
Free_adv_train
⭐
95
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Llm Sp
⭐
92
Papers and resources related to the security and privacy of LLMs 🤖
Scratchai
⭐
81
scratchai is a Deep Learning library that aims to store all Deep Learning algorithms. With easy calls to do all the common tasks in AI.
Mia
⭐
81
A library for running membership inference attacks against ML models
Plexiglass
⭐
79
A toolkit for detecting and protecting against vulnerabilities in Large Language Models (LLMs).
Textfool
⭐
79
Plausible looking adversarial examples for text classification
Torchadver
⭐
78
A PyTorch Toolbox for creating adversarial examples that fool neural networks.
Transferattack
⭐
76
TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.
Faceoff
⭐
76
Steps towards physical adversarial attacks on facial recognition
Patch Wise Iterative Attack
⭐
71
Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.
Jpeg Defense
⭐
65
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Crown Ibp
⭐
64
Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTorch).
Strike With A Pose
⭐
63
A simple GUI tool for generating adversarial poses of objects.
Narcissus
⭐
61
The official implementation of the CCS'23 paper, Narcissus clean-label backdoor attack -- only takes THREE images to poison a face recognition dataset in a clean-label way and achieves a 99.89% attack success rate.
Perceptron Benchmark
⭐
60
Robustness benchmark for DNN models.
Robust Local Lipschitz
⭐
50
A Closer Look at Accuracy vs. Robustness
Robust Adv Malware Detection
⭐
49
Code repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Trojai
⭐
41
A repository to quickly generate synthetic data and associated trojaned deep learning models
Proof Pudding
⭐
40
Copy cat model for Proofpoint
Featurescatter
⭐
39
Feature Scattering Adversarial Training
Pro_gan_pytorch Examples
⭐
38
Examples trained using the python pytorch package pro-gan-pth
Advflow
⭐
34
[NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".
Athena
⭐
34
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Adversarial Distributional Training
⭐
31
Adversarial Distributional Training (NeurIPS 2020)
Cat
⭐
30
[CoRL'23] Adversarial Training for Safe End-to-End Driving
Gd Uap
⭐
30
Generalized Data-free Universal Adversarial Perturbations
Ead_attack
⭐
30
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
If Defense
⭐
28
This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
Fast Certified Robust Training
⭐
22
[NeurIPS 2021] Fast Certified Robust Training with Short Warmup
Amr
⭐
22
This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversarial Training Towards Robust Multimedia Recommender System.
Human Extractor
⭐
20
👤 Cutting people out automatically using Image translation's architecture Pix2Pix
Smoothing Consistency
⭐
19
Code for the paper "Consistency Regularization for Certified Robustness of Smoothed Classifiers" (NeurIPS 2020)
Adversarial Patch Training
⭐
18
Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.
Robustarchitecturesearch
⭐
18
This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks"
Robrank
⭐
18
Adversarial Attack and Defense in Deep Ranking, arXiv:2106.03614
Adv Part Model
⭐
18
Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)
Advrank
⭐
17
Adversarial Ranking Attack and Defense, ECCV, 2020.
Adversarial Nonparametrics
⭐
17
Robustness for Non-Parametric Classification: A Generic Attack and Defense
Mockingbird
⭐
16
Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces" which is published in IEEE Transactions on Information Forensics and Security (TIFS).
Adversarial Code Generation
⭐
14
Source code for the ICLR 2021 work "Generating Adversarial Computer Programs using Optimized Obfuscations"
Tulip
⭐
14
Scaleable input gradient regularization
Transfer_attack_rap
⭐
14
Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)
Honest But Curious Nets
⭐
14
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
Translearn
⭐
14
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Hat
⭐
14
Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off
St Data
⭐
13
Official Source Code of the paper "Exploring Effective Data for Surrogate Training Towards Black-box Attack", which is accepted by CVPR 2022
Thermometerencoding
⭐
13
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch
Robust Principles
⭐
12
Robust Principles: Architectural Design Principles for Adversarially Robust CNNs
Advewm
⭐
12
Contrastive Poisoning
⭐
12
[ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning
Ggan
⭐
11
Generative adversarial network for normalizing and predicting time-dependent graphs with respect to a fixed template.
Tf2 Keras Gan Notebooks
⭐
11
Generative Adversarial Networks with TensorFlow2, Keras and Python (Jupyter Notebooks Implementations)
Dynamic_adv_training
⭐
11
Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"
Adversarial Divergence Reduction
⭐
11
Tensorflow implementation for the ECCV20 paper "Improving Adversarial Robustness by Enforcing Local and Global Compactness"
Amos
⭐
10
[ICLR 2022] Pretraining Text Encoders with Adversarial Mixture of Training Signal Generators
Watermark Vaccine
⭐
10
The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)
Sa_dqn
⭐
10
[NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning
Nips17_adv_attack
⭐
10
Tensorflow Implementation of adversarial learning based adversarial example generator
Cxr_adv
⭐
10
Repository for the paper "An Adversarial Approach for the Robust Classification of Pneumonia from Chest Radiographs"
Reap Benchmark
⭐
9
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
Lgv Geometric Transferability
⭐
9
Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"
Deid Training Data
⭐
8
Privacy-preserving representations of training data for de-identification
Featurespaceattack
⭐
8
Code for AAAI 2021 "Towards Feature Space Adversarial Attack".
It Defense
⭐
8
Our code for paper 'The art of defense: letting networks fool the attacker', IEEE Transactions on Information Forensics and Security, 2023
Privacyattack_at_fl
⭐
7
A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.
Hybrid_augment
⭐
7
[ICCV 2023] HybridAugment++: Unified Frequency Spectra Perturbations for Model Robustness
Gym Battleship
⭐
7
Battleship environment for reinforcement learning tasks
Stereopagnosia
⭐
7
PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)
Sauron
⭐
6
Code for 'One Neuron to Fool Them All'
Hardening Deep Neural Networks Via Adversarial Model Cascades
⭐
6
Official code repository for our publication 'Hardening Deep Neural Networks via Adversarial Model Cascades'
Adversarial Machine Learning
⭐
6
Hands-on tutorial on adversarial examples 😈. With Streamlit app ❤️.
Sa_ppo
⭐
6
[NeurIPS 2020 Spotlight] State-adversarial PPO for robust deep reinforcement learning
Vbad
⭐
5
Black-box Adversarial Attacks on Video Recognition Models. (VBAD)
Defensivefsl
⭐
5
The Pytorch code of "Defensive Few-Shot Learning", TPAMI 2022.
Transferable_perturbations
⭐
5
[NeurIPS2021] Code Release of Learning Transferable Perturbations
Adversarial_robustness_zsl
⭐
5
[ECCV 2020 AROW Workshop] A Deep Dive into Adversarial Robustness in Zero-Shot Learning
Glot
⭐
5
Global-Local Regularization Via Distributional Robustness (AISTATS 2023)
Robust Representation Matching
⭐
5
Code for our USENIX Security '22 paper: Transferring Adversarial Robustness Through Robust Representation Matching.
Related Searches
Python Machine Learning (20,195)
Python Script (17,070)
Python Dataset (14,792)
Python Tensorflow (13,736)
Python Deep Learning (13,092)
Python Jupyter Notebook (12,976)
Python Algorithms (10,033)
Python Natural Language Processing (9,064)
Python Artificial Intelligence (8,580)
Python Pytorch (7,877)
1-95 of 95 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.