106 Open Source Adversarial Machine Learning Software Projects
Free and open source adversarial machine learning code projects including engines, APIs, generators, and tools.
Shawn Shan Fawkes 4420 ⭐
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Adversarial Robustness Toolbox 2748 ⭐
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Textattack 1829 ⭐
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Pro_gan_pytorch 472 ⭐
Unofficial PyTorch implementation of the paper titled "Progressive growing of GANs for improved Quality, Stability, and Variation"
Graph Adversarial Learning Literature 525 ⭐
A curated list of adversarial attacks and defenses papers on graph-structured data.
Smoothing Adversarial 192 ⭐
Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"
Msg Gan V1 135 ⭐
MSG-GAN: Multi-Scale Gradients GAN (Architecture inspired from ProGAN but doesn't use layer-wise growing)
Free_adv_train 150 ⭐
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Robust Physical Attack 131 ⭐
Physical adversarial attack for fooling the Faster R-CNN object detector
Scratchai 95 ⭐
scratchai is a Deep Learning library that aims to store all Deep Learning algorithms. With easy calls to do all the common tasks in AI.
Jpeg Defense 77 ⭐
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Realsafe 287 ⭐
A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.
Robust Adv Malware Detection 73 ⭐
Code repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Crown Ibp 69 ⭐
Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTorch).
Adversarial_training_methods 42 ⭐
Implementation of the methods proposed in **Adversarial Training Methods for Semi-Supervised Text Classification** on IMDB dataset (without pre-training)
Spring Epfl Trickster 42 ⭐
Library and experiments for attacking machine learning in discrete domains
Synthesizing Robust Adversarial Examples 48 ⭐
My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-AW
Awesome Machine Learning Reliability 30 ⭐
A curated list of awesome resources regarding machine learning reliability.
Patch Wise Iterative Attack 68 ⭐
Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.
Amr 29 ⭐
This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversarial Training Towards Robust Multimedia Recommender System.
Trojai 47 ⭐
A repository to quickly generate synthetic data and associated trojaned deep learning models
Softsys4ai Athena 35 ⭐
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Human Extractor 26 ⭐
:bust_in_silhouette: Cutting people out automatically using Image translation's architecture Pix2Pix
Stateadvdrl 66 ⭐
[NeurIPS 2020, Spotlight] Code for "Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations"
Adversarial Nonparametrics 17 ⭐
Robustness for Non-Parametric Classification: A Generic Attack and Defense
Translearn 15 ⭐
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Treeverification 18 ⭐
[NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contribution)
Attack And Defense Methods 122 ⭐
A curated list of papers on adversarial machine learning (adversarial examples and defense methods).
Thermometerencoding 16 ⭐
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch
Cxr_adv 19 ⭐
Repository for the paper "An Adversarial Approach for the Robust Classification of Pneumonia from Chest Radiographs"
Awesome Adversarial Interpretable Machine Learning 121 ⭐
💡 Adversarial attacks on model explanations, and evaluation approaches
Dynamic_adv_training 23 ⭐
Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"
Robustarchitecturesearch 15 ⭐
This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks"
Nips17_adv_attack 9 ⭐
Tensorflow Implementation of adversarial learning based adversarial example generator
Smoothing Consistency 25 ⭐
Code for the paper "Consistency Regularization for Certified Robustness of Smoothed Classifiers" (NeurIPS 2020)
Awesome Real World Adversarial Examples 40 ⭐
😎 A curated list of awesome real-world adversarial examples resources
If Defense 32 ⭐
This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
Robustbench 267 ⭐
RobustBench: a standardized adversarial robustness benchmark [NeurIPS'21 Benchmarks and Datasets Track]
Backdoors101 165 ⭐
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Auto_lirpa 122 ⭐
[NeurIPS 2020]auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks
Adversarial Recommender Systems Survey 87 ⭐
The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., attacking and defense recommendation models), (ii) to show another successful application of AML in generative adversarial networks (GANs) for generative applications, thanks to their ability for learning (high-dimensional) data distributions. In this survey, we provide an exhaustive literature review of 74 articles published in major RS and ML journals and conferences. This review serves as a reference for the RS community, working on the security of RS or on generative models using GANs to improve their quality.
Procedural Advml 46 ⭐
Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Advflow 35 ⭐
[NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".
Rs Adversarial Learning 41 ⭐
A curated collection of adversarial attack and defense on recommender systems.
Amlrecsys Tutorial 22 ⭐
Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommender Systems
Beta Crown 23 ⭐
β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification
Adversarial Patch Training 19 ⭐
Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.
Sa_dqn 18 ⭐
[NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning
Adversarial Divergence Reduction 13 ⭐
Tensorflow implementation for the ECCV20 paper "Improving Adversarial Robustness by Enforcing Local and Global Compactness"
Msrocean Mockingbird 16 ⭐
Keras with Tensorflow implementation of our paper "Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces" which is published in IEEE Transactions on Information Forensics and Security (TIFS).
Csce585 Mlsystems Project Athena 12 ⭐
This is the course project for CSCE585: ML Systems. Students will build their machine learning systems based on the provided infrastructure --- Athena.
Short Lived Adversarial Perturbations 13 ⭐
Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations
Adversarial Code Generation 14 ⭐
Source code for the ICLR 2021 work "Generating Adversarial Computer Programs using Optimized Obfuscations"
Ggan 11 ⭐
Generative adversarial network for normalizing and predicting time-dependent graphs with respect to a fixed template.
Adversarial Examples For Audio Data 13 ⭐
Repo for papers to read on adversarial attack and defense techniques in the audio domain.
Tf2 Keras Gan Notebooks 13 ⭐
Generative Adversarial Networks with TensorFlow2, Keras and Python (Jupyter Notebooks Implementations)
Honest But Curious Nets 11 ⭐
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)