Universal Adversarial Perturbations based on the (p, q)-singular vectors.
☆12Jan 8, 2018Updated 8 years ago
Alternatives and similar repositories for singular-fool
Users that are interested in singular-fool are comparing it to the libraries listed below
Sorting:
- The code of paper: Robust Face Sketch Synthesis via Generative Adversarial Fusion of Priors and Parametric Sigmoid (pGAN) [IJCAI 2018]☆17Oct 15, 2019Updated 6 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆31Jun 9, 2020Updated 5 years ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- An interactive command line interface for displaying the state of multiple git repositories in a single screen☆48Mar 19, 2015Updated 10 years ago
- The implementation of Learning Instance and Task-Aware Dynamic Kernels for Few Shot Learning☆13Apr 14, 2024Updated last year
- ☆12Dec 22, 2025Updated 2 months ago
- An open source light-weight OS X twitter client based on jQuery and Fluid (deprecated!)☆61Dec 24, 2012Updated 13 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- Developer focused AI Gateway☆15Mar 7, 2025Updated last year
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- ☆11Mar 13, 2023Updated 2 years ago
- Reconstruction ICA☆10Aug 25, 2017Updated 8 years ago
- In short...Exports PSD layers to scenes with PNGS ready to run in Corona..☆15Jun 3, 2011Updated 14 years ago
- A programming action game.☆13Feb 15, 2024Updated 2 years ago
- Deep Learning with Multiple Objectives: 2021 edition☆10May 27, 2021Updated 4 years ago
- ☆12Apr 22, 2024Updated last year
- Assignments for AML course @ UvA. Fall 2017☆14Nov 22, 2017Updated 8 years ago
- Fast Vector Operations on Pretty Big Data☆13Nov 17, 2015Updated 10 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- Web page content extractor☆31Feb 26, 2013Updated 13 years ago
- Dimensionality reduction based on distance preservation to local mean for symmetric positive definite matrices☆10Jun 17, 2017Updated 8 years ago
- An Atom theme for a more native experience on OS X 10.10 Yosemite - DEPRECATED☆39Apr 3, 2023Updated 2 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆10Apr 21, 2022Updated 3 years ago
- ☆248Jan 12, 2019Updated 7 years ago
- Proxy a single incomming TCP connection to multiple remote TCP servers☆13Apr 24, 2016Updated 9 years ago
- 🚀 Building an OpenAI-Compatible API with Open-Source LLM: Rate-Limiting, Custom API Keys 🔐, and Streamlit Authentication 🌐☆24Sep 9, 2024Updated last year
- CCS 2023 | Explainable malware and vulnerability detection with XAI in paper "FINER: Enhancing State-of-the-art Classifiers with Feature …☆11Aug 20, 2024Updated last year
- Hand Gesture Recognition-opencv☆12Jul 10, 2016Updated 9 years ago
- PHP WebSocket Server for PHP 5.3☆28Jul 29, 2012Updated 13 years ago
- Converts Quora's new NLU dataset to SNLI txt/jsonl format, plus test/dev split, tokenization.☆14Jan 27, 2017Updated 9 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- Access hint databases from tactics.☆12Apr 22, 2020Updated 5 years ago
- PyTorch implmentation of LocoGAN: https://arxiv.org/abs/2002.07897☆11Feb 8, 2021Updated 5 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Virtual screening and cheminformatics utilities☆14Jan 20, 2016Updated 10 years ago
- fingerprint verification using convolution neural networks☆11Apr 3, 2018Updated 7 years ago