IBM / CLEVER-Robustness-Score
Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach,” ICLR 2018
☆52Updated 6 years ago
Alternatives and similar repositories for CLEVER-Robustness-Score:
Users that are interested in CLEVER-Robustness-Score are comparing it to the libraries listed below
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆61Updated 3 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- ☆25Updated 6 years ago
- ConvexPolytopePosioning☆35Updated 5 years ago
- ☆11Updated 5 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆25Updated 4 years ago
- Code for Stability Training with Noise (STN)☆21Updated 4 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆99Updated 2 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆25Updated 5 years ago
- ☆26Updated 2 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆33Updated 5 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Updated 6 years ago
- ☆54Updated 2 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆31Updated 4 years ago
- ☆65Updated last year
- Craft poisoned data using MetaPoison☆50Updated 3 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 5 years ago
- ☆64Updated 4 years ago
- ☆24Updated 2 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆55Updated 3 years ago
- ☆31Updated 6 months ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Updated 4 years ago
- ☆83Updated 4 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆18Updated 2 years ago