A pytorch implementation of "Intriguing properties of neural networks"
☆26Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for IPNN-pytorch
Users that are interested in IPNN-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Planckian Jitter data augmentation procedure from "Planckian jitter: enhancing the color quality of self-supervised visual representation…☆24Jan 24, 2023Updated 3 years ago
- [ICML 2023] "NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations" by Yonggan …☆18Mar 10, 2024Updated 2 years ago
- ☆23Sep 1, 2020Updated 5 years ago
- A Tensorflow 2.0 reimplementation of World Models - David Ha, Jürgen Schmidhuber (2018)☆19Mar 25, 2023Updated 3 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆70Sep 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Certified Object Detection with Randomized Median Smoothing☆12Oct 21, 2020Updated 5 years ago
- Official code of paper "MaskSim: Detection of synthetic images by masked spectrum similarity analysis", CVPRW 2024.☆16Jul 16, 2025Updated 9 months ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- The implementation of our paper: Bilinear Representation for Language-Based Image Editing using Conditional Generative Adversarial Networ…☆25Feb 1, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- repository to research & share the "machine learning & security" articles☆20Jun 25, 2018Updated 7 years ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆51Sep 18, 2018Updated 7 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- skeleton variation encoder code in tensorflow☆12May 22, 2016Updated 9 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Sep 4, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- A selection of code resources for mobile robot navigation and control.☆13Aug 8, 2021Updated 4 years ago
- Note: "Deep Reinforcement Learning: An Overview"☆12Mar 26, 2018Updated 8 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆16Apr 24, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- ☆12Aug 12, 2019Updated 6 years ago
- ☆13May 24, 2023Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Privacy-Preserving Prompt Tuning for Large Language Model☆29Mar 19, 2024Updated 2 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- Generative Models for Image Captioning☆10Jun 7, 2017Updated 8 years ago
- ☆20May 6, 2022Updated 4 years ago
- 3D Gaussian Splat Easily Attacked to Cause Harm☆12Aug 5, 2025Updated 9 months ago
- Explaining audio differences using language☆16Feb 11, 2025Updated last year
- collection with description of super-resolution related papers, repositories, datasets, loss functions and etc.☆11Dec 12, 2023Updated 2 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago