Simple pytorch implementation of FGSM and I-FGSM
-
Updated
Mar 21, 2018 - Python
Simple pytorch implementation of FGSM and I-FGSM
Hack AI/ML applications — CTF challenges for model attacks, LLMs and AI Agent exploitation.
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
The Anti-Virus for AI Artifacts & RAG Firewall. A static analysis tool scanning Models and Notebooks for RCE, Datasets and RAG docs for Data Poisoning, PII, and Prompt Injections. Secure your AI Supply Chain.
AI SBOM: AI Software Bill of Materials - The Supply Chain for Artificial Intelligence
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Hands-on lessons for attacking and defending AI systems, starting with the OWASP Top 10 for LLM Applications.
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)
Open-source prompt injection attack console. Test AI security by firing categorized attacks at any endpoint.
Test and evaluate Large Language Models against prompt injections, jailbreaks, and adversarial attacks with a web-based interactive lab.
Datasets for training deep neural networks to defend software applications
Comprehensive, auto-updating literature review of GenAI & LLM security research, standards, tools, and resources. 100+ curated entries with interactive webapp.
Educational research demonstrating weight manipulation attacks in SafeTensors models. Proves format validation alone is insufficient for AI model security.
Reproducible research scaffolding for privacy-risk auditing of diffusion models.
Open methodology for systematic adversarial evaluation of small language models in regulated industry deployments
Enterprise-grade prompt injection detection and AI firewall for LLM applications
Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression
A stochastic input pre-processing technique based on a process of down-sampling/up-sampling using convolution and transposed convolution layers. Defending convolutional neural network against adversarial attacks.
Research artifact, paper, and frozen evaluation outputs for selective revocation and replay after persistent indirect prompt injection in memory-augmented LLM agents.
Add a description, image, and links to the machine-learning-security topic page so that developers can more easily learn about it.
To associate your repository with the machine-learning-security topic, visit your repo's landing page and select "manage topics."