AminJun / lisa
LISA Traffic Signs Dataset for Pytorch. For Classification. 32x32 images. I use this to reproduce the Activation Clustering Results.
☆19Updated 4 years ago
Alternatives and similar repositories for lisa:
Users that are interested in lisa are comparing it to the libraries listed below
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- ☆46Updated 4 years ago
- ☆9Updated 4 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆16Updated 4 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆33Updated 5 years ago
- ☆51Updated 3 years ago
- Official implementation of "RelaxLoss: Defending Membership Inference Attacks without Losing Utility" (ICLR 2022)☆49Updated 2 years ago
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆71Updated last year
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆102Updated 8 months ago
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆19Updated 4 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆25Updated 2 years ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆53Updated 2 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆34Updated 2 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40Updated 4 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆27Updated 4 years ago
- ☆28Updated 3 years ago
- ☆69Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆46Updated last year
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆31Updated 3 years ago
- ☆21Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- ☆65Updated last year
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆30Updated 3 years ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- ☆81Updated 3 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆12Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆31Updated 4 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago