Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)
☆12Aug 25, 2020Updated 5 years ago
Alternatives and similar repositories for FPD-for-Adversarial-Robustness
Users that are interested in FPD-for-Adversarial-Robustness are comparing it to the libraries listed below
Sorting:
- ☆25Mar 24, 2023Updated 2 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- A Fine-grained Differentially Private Federated Learning against Leakage from Gradients☆15Jan 18, 2023Updated 3 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- ☆19Mar 26, 2022Updated 3 years ago
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- ☆38Jun 10, 2021Updated 4 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆20Aug 15, 2022Updated 3 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆21Oct 1, 2022Updated 3 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆101Oct 13, 2018Updated 7 years ago
- ☆27Nov 9, 2022Updated 3 years ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆33Dec 2, 2023Updated 2 years ago
- ☆55Updated this week
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Dec 12, 2021Updated 4 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆41Apr 3, 2023Updated 2 years ago
- ☆10May 18, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 7 months ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- This repository contains the notebook used for the experiments of the papers: "A Deeper Analysis of Adversarial Examples in Intrusion Det…☆10Dec 8, 2021Updated 4 years ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- Implementation of Skip-GANomaly with MNIST dataset☆11Nov 28, 2019Updated 6 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- Based on the paper "Fast and lean encrypted Internet traffic classification," in Computer Communications, by S. Roy, T. Shapira and Y. Sh…☆10May 28, 2022Updated 3 years ago
- A disentangled intrusion detection method to handle various intrusion detection scenarios, e.g. known attacks, unknown attacks, and few-s…☆21Sep 9, 2025Updated 6 months ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago