Strongest attack against Feature Scatter and Adversarial Interpolation
☆25Dec 26, 2019Updated 6 years ago
Alternatives and similar repositories for FeatureAttack
Users that are interested in FeatureAttack are comparing it to the libraries listed below
Sorting:
- Feature Scattering Adversarial Training (NeurIPS19)☆74Jun 1, 2024Updated last year
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Dec 23, 2020Updated 5 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆153Oct 15, 2020Updated 5 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆17Jul 5, 2024Updated last year
- Unofficial implementation of the paper 'Adversarial Training for Free'☆23May 8, 2019Updated 6 years ago
- ☆16Dec 4, 2019Updated 6 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆739May 16, 2024Updated last year
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 5 years ago
- Semisupervised learning for adversarial robustness https://arxiv.org/pdf/1905.13736.pdf☆142Mar 30, 2020Updated 5 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆553Mar 30, 2023Updated 2 years ago
- 생활 자체를 오픈소스화 하기, 생활이 하나의 게임이고 퀘스트라 보자☆10Jun 24, 2019Updated 6 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆505Aug 30, 2021Updated 4 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Aug 8, 2019Updated 6 years ago
- white box adversarial attack☆37Jan 30, 2021Updated 5 years ago
- Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"☆189Feb 18, 2021Updated 5 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- Boilerplate written in ES6 for building scalable, reactive applications.☆12Dec 23, 2016Updated 9 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Oct 4, 2018Updated 7 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Pytorch - Adversarial Training☆26May 9, 2018Updated 7 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- Ask QUESTIONS here. MinnowBoard.org issue and get help submission. See README for use.☆14Feb 8, 2017Updated 9 years ago
- The code for ACM MM2024 (Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning)☆15Jul 18, 2024Updated last year
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Feb 1, 2022Updated 4 years ago
- ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability☆15Aug 16, 2018Updated 7 years ago
- A Self-Consistent Robust Error (ICML 2022)☆69Jun 25, 2023Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19May 23, 2022Updated 3 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- ☆162Feb 26, 2021Updated 5 years ago