Simple pytorch implementation of FGSM and I-FGSM
-
Updated
Mar 21, 2018 - Python
Simple pytorch implementation of FGSM and I-FGSM
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
Datasets for training deep neural networks to defend software applications
This repository contains the code for our ACM CCS'22 paper "StolenEncoder: Stealing Pre-Trained Encoders in Self-Supervised Learning"
Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression
A stochastic input pre-processing technique based on a process of down-sampling/up-sampling using convolution and transposed convolution layers. Defending convolutional neural network against adversarial attacks.
This is the repository for Homeworks of COMP 530 Data Privacy and Security course given by Emre Gursoy at Koc University.
Add a description, image, and links to the machine-learning-security topic page so that developers can more easily learn about it.
To associate your repository with the machine-learning-security topic, visit your repo's landing page and select "manage topics."