machine-learning-security
There are 17 repositories under machine-learning-security topic.
1Konny/FGSM
Simple pytorch implementation of FGSM and I-FGSM
RiccardoBiosas/awesome-MLSecOps
A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.
jackaduma/SecBERT
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
whyisyoung/CADE
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
alexdevassy/Machine_Learning_CTF_Challenges
CTF challenges designed and implemented in machine learning applications
JosephTLucas/HackThisAI
Adversarial Machine Learning (AML) Capture the Flag (CTF)
jay-johnson/train-ai-with-django-swagger-jwt
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
wearetyomsmnv/AI-LLM-ML_security_study_map
Do you want to learn AI Security but don't know where to start ? Take a look at this map.
mmalekzadeh/honest-but-curious-nets
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
jay-johnson/antinex-datasets
Datasets for training deep neural networks to defend software applications
liu00222/StolenEncoder
This repository contains the code for our ACM CCS'22 paper "StolenEncoder: Stealing Pre-Trained Encoders in Self-Supervised Learning"
tugot17/ML-In-Cybersecurity-Paper
Summary of the presentation on Real and Stealthy Attacks on State-of-the-Art Face Recognition Systems at the Seminar: Machine Learning in Cyber-security at FU Berlin
AmiraGuesmi-mls/Stochastic-Input-Transformation
A stochastic input pre-processing technique based on a process of down-sampling/up-sampling using convolution and transposed convolution layers. Defending convolutional neural network against adversarial attacks.
ASRS-Lab/Awesome-DL-Security-and-Privacy-Papers
Awesome-DL-Security-and-Privacy-Papers
Framartin/adversarial-logistic
Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression
tkuo-tkuo/ML-Security-in-Computer-Vision-System
Final Year Thesis Project (COMP4981H) for Computer Science Students in HKUST
EsadSimitcioglu/COMP-530
This is the repository for Homeworks of COMP 530 Data Privacy and Security course given by Emre Gursoy at Koc University.