Flag-C / ThermometerEncodingLinks
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch
☆16Updated 7 years ago
Alternatives and similar repositories for ThermometerEncoding
Users that are interested in ThermometerEncoding are comparing it to the libraries listed below
Sorting:
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Updated 8 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆71Updated 7 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Updated 7 years ago
- Official repository for "Bridging Adversarial Robustness and Gradient Interpretability".☆30Updated 6 years ago
- Implementation of the Deep Frank-Wolfe Algorithm -- Pytorch☆62Updated 4 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 7 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 7 years ago
- NIPS 2017 Adversarial Competition in PyTorch☆14Updated 7 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆18Updated last year
- ☆34Updated 6 years ago
- ☆29Updated 6 years ago
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆15Updated 7 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 5 years ago
- SmoothGrad implementation in PyTorch☆172Updated 4 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆128Updated 5 years ago
- Official PyTorch implementation for our ICCV 2019 paper - Fooling Network Interpretation in Image Classification☆24Updated 5 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- A PyTorch implementation of shake-shake☆111Updated 5 years ago
- ☆26Updated 6 years ago
- A collection of methods to fool the deep neural network☆76Updated 11 months ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Updated 5 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Updated 6 years ago
- ☆23Updated 6 years ago
- Pytorch implementation of Real Time Image Saliency for Black Box Classifiers https://arxiv.org/abs/1705.07857☆59Updated 5 years ago
- An Implementation of "Small steps and giant leaps: Minimal Newton solvers for Deep Learning" In pytorch☆21Updated 7 years ago
- NIPS Implementation challenge 2017 for "Searching for activation functions" paper by Google Brain☆32Updated 6 years ago
- Scaleable input gradient regularization☆22Updated 6 years ago
- ☆11Updated 5 years ago
- ☆31Updated 4 years ago
- Data independent universal adversarial perturbations☆63Updated 5 years ago