LISA Traffic Signs Dataset for Pytorch. For Classification. 32x32 images. I use this to reproduce the Activation Clustering Results.
☆20Jan 12, 2021Updated 5 years ago
Alternatives and similar repositories for lisa
Users that are interested in lisa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Driving v.s. Autonomous Driving.☆23Jul 29, 2023Updated 2 years ago
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆15Jul 13, 2022Updated 3 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- Not All Poisons are Created Equal: Robust Training against Data Poisoning (ICML 2022)☆22Aug 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- python RobustRMC projects☆10Apr 22, 2024Updated 2 years ago
- ☆19Mar 26, 2022Updated 4 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 5 years ago
- ☆20Jan 26, 2025Updated last year
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- Repository implementing the lightweight split learning framework enabling edge devices to collaboratively train machine learning models w…☆10Mar 27, 2024Updated 2 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- ☆12Feb 15, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Oct 16, 2024Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- ☆12Apr 27, 2022Updated 4 years ago
- ☆17Nov 24, 2025Updated 5 months ago
- This is official code for ASFL.☆22Mar 3, 2025Updated last year
- Training MMDetection CV models on AWS Sagemaker platform☆15Jan 20, 2021Updated 5 years ago
- Federated Adversrial Learning/ Training Framework. A testing ground for conducting relevant research.☆11Oct 9, 2022Updated 3 years ago
- truncated Gaussian-Mixture Variational AutoEncoder☆11Mar 14, 2019Updated 7 years ago
- Unofficial keras(tensorflow) implementation of MAE model from Masked Autoencoders Are Scalable Vision Learners☆14Apr 16, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This MERN stack real estate application, uses Auth0 for login, it has the search functionality to look for properties listed for sale, an…☆10Jan 6, 2021Updated 5 years ago
- Repo on unlearning in FL. FYP22002@HKUCS.☆15Apr 22, 2023Updated 3 years ago
- ☆16May 9, 2022Updated 4 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 6 years ago
- PyTorch Implementation of the CLIP Algorithm☆14Sep 23, 2024Updated last year
- Adversarial detection and defense for deep learning systems using robust feature alignment☆17Nov 10, 2020Updated 5 years ago
- Bachelor's Thesis on Adversarial Machine Learning Attacks and Defences☆17Nov 18, 2022Updated 3 years ago
- vgg cifar-10☆15Mar 31, 2023Updated 3 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Work relating to the OCR wish-list item "figure out an algorithm that would separate images into sets with no handwriting, little handwri…☆20Feb 22, 2013Updated 13 years ago
- ☆11Sep 22, 2019Updated 6 years ago
- Python package to create adversarial agents for membership inference attacks againts machine learning models☆46Feb 12, 2019Updated 7 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Mar 14, 2022Updated 4 years ago
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆20Jan 24, 2024Updated 2 years ago
- DeepDip, a DRL Gym agent that plays no-press Diplomacy in BANDANA☆13Jul 22, 2019Updated 6 years ago
- ☆25Feb 14, 2024Updated 2 years ago