machine-learning-security
There are 24 repositories under machine-learning-security topic.
RiccardoBiosas/awesome-MLSecOps
A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.
1Konny/FGSM
Simple pytorch implementation of FGSM and I-FGSM
jackaduma/SecBERT
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
alexdevassy/Machine_Learning_CTF_Challenges
CTF challenges designed and implemented in machine learning applications
whyisyoung/CADE
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
EzgiKorkmaz/adversarial-reinforcement-learning
Reading list for adversarial perspective and robustness in deep reinforcement learning.
JosephTLucas/HackThisAI
Adversarial Machine Learning (AML) Capture the Flag (CTF)
jay-johnson/train-ai-with-django-swagger-jwt
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
wearetyomsmnv/AI-LLM-ML_security_study_map
Do you want to learn AI Security but don't know where to start ? Take a look at this map.
citizenjosh/ai-security-training-lab
Hands-on lessons for attacking and defending AI systems, starting with the OWASP Top 10 for LLM Applications.
mmalekzadeh/honest-but-curious-nets
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
jay-johnson/antinex-datasets
Datasets for training deep neural networks to defend software applications
liu00222/StolenEncoder
This repository contains the code for our ACM CCS'22 paper "StolenEncoder: Stealing Pre-Trained Encoders in Self-Supervised Learning"
tugot17/ML-In-Cybersecurity-Paper
Summary of the presentation on Real and Stealthy Attacks on State-of-the-Art Face Recognition Systems at the Seminar: Machine Learning in Cyber-security at FU Berlin
siva17680/SYnex
A high-security Linux OS for ethical hacking & penetration testing. Built on Kali & Parrot OS. Features AI intrusion detection, stealth VPN, custom kernel & more.
AmiraGuesmi-mls/Stochastic-Input-Transformation
A stochastic input pre-processing technique based on a process of down-sampling/up-sampling using convolution and transposed convolution layers. Defending convolutional neural network against adversarial attacks.
ASRS-Lab/Awesome-DL-Security-and-Privacy-Papers
Awesome-DL-Security-and-Privacy-Papers
Framartin/adversarial-logistic
Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression
tkuo-tkuo/ML-Security-in-Computer-Vision-System
Final Year Thesis Project (COMP4981H) for Computer Science Students in HKUST
EsadSimitcioglu/COMP-530
This is the repository for Homeworks of COMP 530 Data Privacy and Security course given by Emre Gursoy at Koc University.
nothingonyou3/MLSecJan
Certified Adversarial Robustness via Randomized Smoothing on CIFAR10
shahriar0651/NoiSec
Official Implementation of the NoiSec [ESORICS'25] paper: Let the Noise Speak — A Unified Defense Against Adversarial and Backdoor Attacks
um-dsp/PoisonSpot
Inspired by dynamic taint tracking, PoisonSpot uses fine-grained training provenance tracker that: (1) tags & traces the impact of every single training sample on model updates, (2) probabilistically scores suspect samples based on their linage of impact on model weights, and (3) separates the clean from the poisonous before retraining a model.