IBM / CLEVER-Robustness-Score
Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach,” ICLR 2018
☆52Updated 6 years ago
Alternatives and similar repositories for CLEVER-Robustness-Score:
Users that are interested in CLEVER-Robustness-Score are comparing it to the libraries listed below
- Craft poisoned data using MetaPoison☆51Updated 4 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆61Updated 3 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆25Updated 4 years ago
- ☆64Updated 4 years ago
- ConvexPolytopePosioning☆35Updated 5 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- ☆85Updated 4 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Updated 6 years ago
- ☆25Updated 6 years ago
- ☆26Updated 2 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆99Updated 2 years ago
- Library for training globally-robust neural networks.☆28Updated last year
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- ☆51Updated 3 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆123Updated 4 years ago
- ☆12Updated 5 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆63Updated 5 years ago
- ☆54Updated 2 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 2 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆32Updated 6 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆52Updated 3 years ago
- AAAI 2019 oral presentation☆50Updated this week
- RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)☆56Updated 4 years ago
- ☆81Updated 3 years ago