[CCS 2021] TSS: Transformation-specific smoothing for robustness certification
☆26Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for semantic-randomized-smoothing
Users that are interested in semantic-randomized-smoothing are comparing it to the libraries listed below
Sorting:
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Mar 24, 2023Updated 2 years ago
- ☆22Apr 15, 2022Updated 3 years ago
- Provable adversarial robustness at ImageNet scale☆406May 20, 2019Updated 6 years ago
- This is the official code for CoRL 2022 "Robustness Certification of Visual Perception Models via Camera Motion Smoothing"☆11Apr 5, 2023Updated 2 years ago
- ☆12Mar 25, 2020Updated 5 years ago
- ☆17Jun 18, 2025Updated 8 months ago
- The VeriNet toolkit for verification of neural networks☆22Jul 2, 2023Updated 2 years ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆32Jun 24, 2025Updated 8 months ago
- Code for "Margin-aware Adversarial Domain Adaptation with Optimal Transport" paper☆16Jan 31, 2022Updated 4 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Invariant-feature Subspace Recovery (ISR)☆23Sep 23, 2022Updated 3 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- An Algorithm to Quantify Robustness of Recurrent Neural Networks☆49Apr 24, 2020Updated 5 years ago
- Certified robustness "for free" using off-the-shelf diffusion models and classifiers☆44May 25, 2023Updated 2 years ago
- Functional Optimal Transport: Map Estimation and Domain Adaptation for Functional data☆27Jun 7, 2021Updated 4 years ago
- Randomized Smoothing of All Shapes and Sizes (ICML 2020).☆51Jul 23, 2020Updated 5 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- [CHIL 2024] Interpretation of Intracardiac Electrograms Through Textual Representations☆12Sep 4, 2024Updated last year
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs☆338Feb 3, 2026Updated 3 weeks ago
- Library for training globally-robust neural networks.☆31Aug 7, 2025Updated 6 months ago
- A modular toolkit for benchmarking safe robotic control systems.☆48Feb 12, 2026Updated 2 weeks ago
- Learning perturbation sets for robust machine learning☆65Aug 23, 2021Updated 4 years ago
- [CVPR2025] We present SleeperMark, a novel framework designed to embed resilient watermarks into T2I diffusion models☆37May 26, 2025Updated 9 months ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- ☆31Apr 8, 2020Updated 5 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- DBA: Distributed Backdoor Attacks against Federated Learning (ICLR 2020)☆202Aug 5, 2021Updated 4 years ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆221Jul 25, 2024Updated last year
- ☆12Nov 30, 2018Updated 7 years ago
- Implementation of the CVPR2025 paper LoTUS: Large-Scale Machine Unlearning with a Taste of Uncertainty.☆17Sep 10, 2025Updated 5 months ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- [NeurIPS'21] "AugMax: Adversarial Composition of Random Augmentations for Robust Training" by Haotao Wang, Chaowei Xiao, Jean Kossaifi, Z…☆125Dec 29, 2021Updated 4 years ago