PyTorch implementations of Adversarial defenses and utils.
☆34Dec 25, 2023Updated 2 years ago
Alternatives and similar repositories for adversarial-defenses-pytorch
Users that are interested in adversarial-defenses-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gradient-based Hyperparameter Optimization Over Long Horizons☆14Sep 29, 2021Updated 4 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,158Jun 29, 2024Updated last year
- ☆31Jul 7, 2024Updated last year
- baseline mode for the ObjectNet competition☆18Jan 13, 2021Updated 5 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆98Mar 4, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆261Apr 16, 2021Updated 5 years ago
- Train several classical classification networks in cifar10 dataset by PyTorch☆23Mar 31, 2021Updated 5 years ago
- Defense GAN in pytorch☆13May 12, 2019Updated 6 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- ☆15Jun 5, 2023Updated 2 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Simple implementation of the C&W attack on a pre-trained Keras's InceptionV3 on Imagenet☆10Jan 4, 2021Updated 5 years ago
- A Toolbox for Adversarial Robustness Research☆1,367Sep 14, 2023Updated 2 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆25Dec 16, 2025Updated 4 months ago
- ☆44Oct 30, 2025Updated 6 months ago
- ☆48Feb 9, 2021Updated 5 years ago
- ☆43May 21, 2020Updated 5 years ago
- ☆14May 16, 2021Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 3 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- Implementation of CarSNN: An Efficient Spiking Neural Network for Event-Based Autonomous Cars on the Loihi Neuromorphi☆15Aug 4, 2021Updated 4 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Pytorch (PyG) and Tensorflow (Keras/Spektral) implementation of Total Variation Graph Neural Network (TVGNN), as presented at ICML 2023.☆20Mar 15, 2025Updated last year
- Official repo for EMNLP'24 paper "SOUL: Unlocking the Power of Second-Order Optimization for LLM Unlearning"☆30Oct 1, 2024Updated last year
- Exploring Negatives in Contrastive Learning for Unpaired Image-to-Image Translation☆13Mar 16, 2023Updated 3 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Kaggle | 45th place solution for IEEE's Signal Processing Society - Camera Model Identification☆30May 6, 2019Updated 7 years ago
- Code accompanying the NeurIPS 2019 paper AutoAssist: A Framework to Accelerate Training of Deep Neural Networks.☆14Oct 3, 2022Updated 3 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago