☆82Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for AISafety
Users that are interested in AISafety are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official PyTorch implemetation of paper "X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection".☆16Feb 21, 2023Updated 3 years ago
- The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training tec…☆150Feb 4, 2026Updated 3 months ago
- ☆12Sep 22, 2023Updated 2 years ago
- The official PyTorch implementation of "Adversarially-Aware Robust Object Detector"☆65Sep 22, 2022Updated 3 years ago
- ☆21Nov 19, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Jun 14, 2018Updated 7 years ago
- CVPR 2021 | Code to reproduce the results of the paper: A Khakzar, S Baselizadeh, S Khanduja, C Rupprecht, ST Kim, N Navab, Neural Respon…☆12Jun 23, 2021Updated 4 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- ☆14Feb 3, 2026Updated 3 months ago
- ☆13Dec 8, 2022Updated 3 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆23Apr 30, 2024Updated 2 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆68Jun 2, 2022Updated 3 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- [ACM MM 2024] ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack☆14Dec 20, 2024Updated last year
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 4 years ago
- official Pytorch implementation of paper 'Improving transferability of 3D adversarial attacks with scale and shear transformations', Info…☆10Apr 26, 2024Updated 2 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆16Feb 15, 2022Updated 4 years ago
- Code for our CVPR 2023 paper: Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation☆29Jul 9, 2024Updated last year
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆228May 21, 2019Updated 7 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆776Apr 14, 2026Updated last month
- ☆12Apr 27, 2022Updated 4 years ago
- codes and pre-trained models of paper "Segatron: Segment-aware Transformer for Language Modeling and Understanding"☆18Oct 25, 2022Updated 3 years ago
- ☆44May 8, 2020Updated 6 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆44Aug 12, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆89Mar 24, 2023Updated 3 years ago
- [NLPCC'23] ZeroGen: Zero-shot Multimodal Controllable Text Generation with Multiple Oracles PyTorch Implementation☆14Oct 7, 2023Updated 2 years ago
- The code of "Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds" CVPR 2024☆35Mar 23, 2024Updated 2 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Jul 20, 2022Updated 3 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago