PyTorch implementations of Adversarial defenses and utils.
☆34Dec 25, 2023Updated 2 years ago
Alternatives and similar repositories for adversarial-defenses-pytorch
Users that are interested in adversarial-defenses-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gradient-based Hyperparameter Optimization Over Long Horizons☆14Sep 29, 2021Updated 4 years ago
- ☆31Jul 7, 2024Updated last year
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- baseline mode for the ObjectNet competition☆18Jan 13, 2021Updated 5 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆98Mar 4, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attac…☆33Dec 7, 2018Updated 7 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Train several classical classification networks in cifar10 dataset by PyTorch☆24Mar 31, 2021Updated 4 years ago
- ☆26Updated this week
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- [ICLR2023] NTK-SAP: Improving neural network pruning by aligning training dynamics☆20May 1, 2023Updated 2 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- ☆15Jun 5, 2023Updated 2 years ago
- A Toolbox for Adversarial Robustness Research☆1,362Sep 14, 2023Updated 2 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆772Mar 31, 2025Updated 11 months ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆25Dec 16, 2025Updated 3 months ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- ☆44Oct 30, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Ali Face attack competition☆13Sep 12, 2019Updated 6 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 2 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Official repo for EMNLP'24 paper "SOUL: Unlocking the Power of Second-Order Optimization for LLM Unlearning"☆30Oct 1, 2024Updated last year
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Code for the papers: "Stop Throwing Away Discriminators! Re-using Adversaries for Test-Time Training", Valvano et al., DART 2021; and "Re…☆10Jan 20, 2022Updated 4 years ago
- Image recognition: using keras tensorflow to classify images of pigmented skin cancer lesions into their respective classes☆14Dec 17, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Flow Matching with Gaussian Process Priors for Probabilistic Time Series Forecasting, ICLR 2025☆28Dec 4, 2025Updated 3 months ago
- Label Smoothing applied in Focal Loss☆13Oct 26, 2020Updated 5 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year