CEAOD / DataLinks
CEA Open Data
☆12Updated 6 months ago
Alternatives and similar repositories for Data
Users that are interested in Data are comparing it to the libraries listed below
Sorting:
- A Meta-Learning Approach for Few-Shot Anomaly Detection and One-Class Classification☆38Updated 4 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Updated 5 years ago
- Adversarial attack to detectors☆46Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Updated 4 years ago
- Code for Class Anchor Clustering loss for training a distance-based open set classifier☆76Updated 3 years ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆20Updated 6 years ago
- Contains implementation of denoising algorithms.☆11Updated 5 years ago
- 百度AI安全对抗赛第一名 团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Updated 6 years ago
- Simple but powerful code for image retrieval task using triplet loss☆10Updated 4 years ago
- Implementation of Conv-based and Vit-based networks designed for CIFAR.☆70Updated 3 years ago
- Pytorch implementation of four neural network based domain adaptation techniques: DeepCORAL, DDC, CDAN and CDAN+E. Evaluated on benchmark…☆94Updated 4 years ago
- Datasets for industrial surface-inspection☆100Updated 3 years ago
- Revisiting Residual Networks for Adversarial Robustness: An Architectural Perspective☆19Updated last year
- The official code for the paper "Delving Deep into Label Smoothing", IEEE TIP 2021☆81Updated 3 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88Updated 6 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 3 years ago
- Implementation of Matching Networks for One Shot Learning in TensorFlow 2.0☆30Updated 6 years ago
- An implementation of MobileNetV3 with pyTorch☆54Updated 5 years ago
- PyTorch code for our paper: Open Set Recognition Through Deep Neural Network Uncertainty: Does Out-of-Distribution Detection Require Gene…☆92Updated 3 years ago
- Unofficial pytorch implementation of Fourier Heat Map proposed in 'A Fourier Perspective on Model Robustness in Computer Vision' [Yin+, N…☆75Updated last year
- A PyTorch implementation of Mixup☆13Updated 7 years ago
- ☆34Updated 3 years ago
- ☆12Updated 2 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆291Updated 7 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Updated 5 years ago
- A simple training/evaluation code of open set recognition using OpenMax (https://arxiv.org/abs/1511.06233)☆59Updated 7 years ago
- ☆51Updated 11 years ago
- Try Openmax with MNIST Fashion dataset☆11Updated 7 years ago