CSC207-UofT / design-pattern-samples
☆10Updated 6 months ago
Alternatives and similar repositories for design-pattern-samples:
Users that are interested in design-pattern-samples are comparing it to the libraries listed below
- Course Notes for CSC207☆168Updated 2 years ago
- ☆10Updated 5 years ago
- TraceFL is a novel mechanism for Federated Learning that achieves interpretability by tracking neuron provenance. It identifies clients r…☆10Updated 5 months ago
- Official implementation of the paper "Stochastic Optimization of Areas Under Precision-Recall Curves with Provable Convergence" published…☆20Updated last year
- ☆56Updated 4 years ago
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆165Updated 4 years ago
- Methods for removing learned data from neural nets and evaluation of those methods☆37Updated 4 years ago
- A user/password manager demonstrating Clean Architecture☆13Updated last year
- Provable adversarial robustness at ImageNet scale☆387Updated 5 years ago
- reference implementation for "explanations can be manipulated and geometry is to blame"☆36Updated 2 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆127Updated last year
- All UofT notes I've made public which are consistently updating. The link to this repository is https://github.com/ICPRplshelp/UofT-Notes…☆62Updated last year
- A unified benchmark problem for data poisoning attacks☆155Updated last year
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 7 years ago
- ☆51Updated 3 years ago
- Processed datasets that we have used in our research☆14Updated 5 years ago
- ☆22Updated 2 years ago
- ☆25Updated 3 years ago
- ☆80Updated 2 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆19Updated 5 months ago
- Original dataset release for CIFAR-10H☆82Updated 4 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 4 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆57Updated 5 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆31Updated 2 years ago
- R-GAP: Recursive Gradient Attack on Privacy [Accepted at ICLR 2021]☆36Updated 2 years ago
- ConvexPolytopePosioning☆35Updated 5 years ago
- PyTorch implementation of Kaggle GTSRB challenge with 99.8% accuracy☆54Updated 6 years ago
- Federated Adversrial Learning/ Training Framework. A testing ground for conducting relevant research.☆11Updated 2 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆123Updated 4 years ago
- Certified robustness of deep neural networks☆19Updated 8 months ago