[CCS 2021] TSS: Transformation-specific smoothing for robustness certification
☆26Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for semantic-randomized-smoothing
Users that are interested in semantic-randomized-smoothing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Provable adversarial robustness at ImageNet scale☆407May 20, 2019Updated 6 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Mar 24, 2023Updated 2 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- ☆11Oct 18, 2022Updated 3 years ago
- ☆22Apr 15, 2022Updated 3 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Implementation of Riemannian optimization for skip-gram negative sampling (ACL 2017)☆19Apr 26, 2018Updated 7 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- Certified robustness "for free" using off-the-shelf diffusion models and classifiers☆44May 25, 2023Updated 2 years ago
- The VeriNet toolkit for verification of neural networks☆22Jul 2, 2023Updated 2 years ago
- ☆18Jun 18, 2025Updated 9 months ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆160Dec 20, 2019Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Registration-aided 3D Point Cloud Learning for Large-Scale Place Recognition (IROS 2021)☆11May 28, 2022Updated 3 years ago
- auto_LiRPA: An Automatic Linear Relaxation based Perturbation Analysis Library for Neural Networks and General Computational Graphs☆339Feb 3, 2026Updated last month
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Multi-agent active perception with prediction rewards☆11Nov 13, 2020Updated 5 years ago
- Code for "Margin-aware Adversarial Domain Adaptation with Optimal Transport" paper☆16Jan 31, 2022Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- Learning perturbation sets for robust machine learning☆64Aug 23, 2021Updated 4 years ago
- Gradient-free optimization method for the multidimensional arrays and discretized multivariate functions based on the tensor train (TT) f…☆40Apr 29, 2025Updated 10 months ago
- Adversarial learning by utilizing model interpretation☆10Oct 19, 2018Updated 7 years ago
- [ICML 2025] UDora: A Unified Red Teaming Framework against LLM Agents☆32Jun 24, 2025Updated 9 months ago
- A certifiable defense against adversarial examples by training neural networks to be provably robust☆220Jul 25, 2024Updated last year
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- ☆11Dec 6, 2020Updated 5 years ago
- ☆10Aug 5, 2020Updated 5 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Invariant-feature Subspace Recovery (ISR)☆23Sep 23, 2022Updated 3 years ago
- A modular toolkit for benchmarking safe robotic control systems.☆48Feb 12, 2026Updated last month
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 2 years ago
- Learning Domain-Invariant Transformation for Speaker Verification.☆11Jun 13, 2023Updated 2 years ago
- Certified Object Detection with Randomized Median Smoothing☆12Oct 21, 2020Updated 5 years ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- Flask App for adpative-bitrate HTTP Live Streaming☆12Feb 2, 2023Updated 3 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago