Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks
☆38May 25, 2021Updated 4 years ago
Alternatives and similar repositories for dent
Users that are interested in dent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆15Nov 27, 2023Updated 2 years ago
- ☆14Jun 6, 2023Updated 2 years ago
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 3 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated last year
- ☆12Jan 28, 2023Updated 3 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- Official code for FAccT'21 paper "Fairness Through Robustness: Investigating Robustness Disparity in Deep Learning" https://arxiv.org/abs…☆13Mar 9, 2021Updated 5 years ago
- Bottom-up feature restoration☆16Aug 30, 2022Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 2 years ago
- ☆34Jan 25, 2024Updated 2 years ago
- ☆21Mar 14, 2025Updated last year
- ☆24Jan 26, 2021Updated 5 years ago
- ☆23Oct 5, 2023Updated 2 years ago
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Dec 24, 2023Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Generate custom text files for dataloader within UDA methods☆14May 24, 2023Updated 2 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Apr 8, 2024Updated last year
- Implementation of CVPR 2022 paper "Learning Distinctive Margin toward Active Domain Adaptation”☆20Apr 3, 2022Updated 3 years ago
- ☆73Jun 27, 2023Updated 2 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆45Aug 29, 2021Updated 4 years ago
- SaTML'23 paper "Backdoor Attacks on Time Series: A Generative Approach" by Yujing Jiang, Xingjun Ma, Sarah Monazam Erfani, and James Bail…☆21Feb 5, 2023Updated 3 years ago
- Repo for the paper "Meta SecAlign: A Secure Foundation LLM Against Prompt Injection Attacks".☆55Mar 17, 2026Updated last week
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Official repo for the paper "Make Some Noise: Reliable and Efficient Single-Step Adversarial Training" (https://arxiv.org/abs/2202.01181)☆25Oct 17, 2022Updated 3 years ago
- ☆25Apr 1, 2025Updated 11 months ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- 天池比赛-铝型材表面瑕疵识别的实现;Pytorch;finetune renet;☆15Oct 27, 2018Updated 7 years ago
- [ CVPR 2021 Oral ] Pytorch implementation for "Adversarial Robustness under Long-Tailed Distribution"☆104Jun 17, 2021Updated 4 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- ☆22Sep 17, 2024Updated last year
- Unofficial implementation for the paper 'Improving Diffusion Models for Inverse Problems using Manifold Constraints'[https://arxiv.org/ab…☆12Aug 21, 2022Updated 3 years ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆65Nov 10, 2025Updated 4 months ago
- The implementatioin code of paper: “A Practical Clean-Label Backdoor Attack with Limited Information in Vertical Federated Learning”☆11Jul 1, 2023Updated 2 years ago