MADONOKOUKI / Block-wise-Scrambled-Image-Recognition
Code for Adaptation Network introduced in "Block-wise Scrambled Image Recognition Using Adaptation Network" paper (AAAI WS 2020)
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Block-wise-Scrambled-Image-Recognition
- ☆19Updated 2 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Updated 3 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆13Updated 2 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆52Updated 4 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆42Updated last year
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆31Updated last year
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 4 years ago
- Attacks against proposed image encryption schemes☆11Updated 4 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆49Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- PRIME: A Few Primitives Can Boost Robustness to Common Corruptions☆42Updated last year
- Code for the paper "SmoothMix: Training Confidence-calibrated Smoothed Classifiers for Certified Robustness" (NeurIPS 2021)☆21Updated 2 years ago
- ☆25Updated 4 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆97Updated 3 years ago
- Smooth Adversarial Training☆67Updated 4 years ago
- ☆35Updated 3 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Updated 2 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆45Updated last year
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 2 years ago
- ☆27Updated 2 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- Trained model weights, training and evaluation code from the paper "A simple way to make neural networks robust against diverse image cor…☆62Updated last year
- ☆39Updated 2 years ago
- ☆13Updated 3 years ago
- Official PyTorch implementation of “Flexible Dataset Distillation: Learn Labels Instead of Images”☆41Updated 4 years ago
- A Pytorch implementation of "Data-Free Learning of Student Networks" (ICCV 2019).☆17Updated 5 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆21Updated 3 years ago
- ☆19Updated 3 years ago
- Code for "JPEG-resistant Adversarial Images"☆40Updated 6 years ago