Implementation of Self-supervised-Online-Adversarial-Purification
☆13Aug 2, 2021Updated 4 years ago
Alternatives and similar repositories for SOAP
Users that are interested in SOAP are comparing it to the libraries listed below
Sorting:
- ☆15Dec 12, 2022Updated 3 years ago
- Defense GAN in pytorch☆13May 12, 2019Updated 6 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- Implementation for <Robust Weight Perturbation for Adversarial Training> in IJCAI'22.☆16Jul 1, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 2 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- Implementation of BadCLIP https://arxiv.org/pdf/2311.16194.pdf☆23Mar 23, 2024Updated last year
- ☆12Jan 30, 2024Updated 2 years ago
- official implementation of "CLIP-VQDiffusion : Langauge Free Training of Text To Image generation using CLIP and vector quantized diffusi…☆19Sep 5, 2024Updated last year
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆31Mar 7, 2026Updated last week
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- unofficial implementation of DiffMAE☆18May 31, 2024Updated last year
- 📄 A Claude skill for comprehensive academic paper analysis — deep reports, mind maps, peer review, and promo scripts.☆39Mar 9, 2026Updated last week
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆36Sep 25, 2023Updated 2 years ago
- Code for implemeting a conditional DDPM trained on CIFAR10☆13Jan 15, 2024Updated 2 years ago
- Official Implementation of CVPR 2023 paper: "VNE: An Effective Method for Improving Deep Representation by Manipulating Eigenvalue Distri…☆28Jun 5, 2023Updated 2 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆25Nov 30, 2023Updated 2 years ago
- Removing Adversarial Noise in Class Activation Feature Space☆14Oct 12, 2023Updated 2 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- pytorch implementation of Parametric Noise Injection for adversarial defense☆46Oct 23, 2019Updated 6 years ago
- AGCN - Spectral ChevNet built on Adaptive, trainable graphs☆11Aug 16, 2020Updated 5 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- Lightweight Face Image Quality Assessment☆12Nov 19, 2021Updated 4 years ago
- ☆43May 21, 2020Updated 5 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- ☆43Jan 25, 2024Updated 2 years ago
- A collection of useful, free, single-file libraries for C.☆11Oct 15, 2015Updated 10 years ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago