an efficient method for detecting adversarial image examples
☆17Jun 3, 2018Updated 7 years ago
Alternatives and similar repositories for DeepDetector
Users that are interested in DeepDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- ☆16Feb 20, 2020Updated 6 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- 分布式服务器☆18Jun 6, 2018Updated 7 years ago
- Implementation for "Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks"☆14Dec 23, 2020Updated 5 years ago
- Mozilla's Community Support Software☆19Mar 29, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVPR'19 experiments with (on-manifold) adversarial examples.☆43Feb 27, 2020Updated 6 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Official implemention of the paper High-Resolution and Precise Counterfactual Medical Image Generation using Language-guided Stable Diffu…☆23Jul 8, 2025Updated 9 months ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆51Sep 18, 2018Updated 7 years ago
- A set of advanced image editing tools.☆12Jun 21, 2016Updated 9 years ago
- Pytorch Dataloader - GTSRB (German Traffic Sign Recognition)☆20Apr 16, 2019Updated 6 years ago
- A Semi-supervised learning model (Ladder Network) to classify MNIST digits. A few attacks were executed on it with the target of misclass…☆10Mar 30, 2023Updated 3 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mastering PyTorch for Deep Learning, Published by Packt☆14Jan 14, 2021Updated 5 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- GTNet:Guided Transformer Network for Detecting Human-Object Interactions☆15Apr 4, 2023Updated 3 years ago
- 水源社区 API client☆17Dec 11, 2023Updated 2 years ago
- PyTorch implementation of a self-attentive speaker embedding☆17Sep 24, 2019Updated 6 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- 豆瓣电影数据分析☆13Aug 28, 2023Updated 2 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Iwara网站数据爬取及本地化☆11Nov 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Mar 19, 2023Updated 3 years ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- Simple sinc interpolation in PyTorch.☆15Jul 8, 2023Updated 2 years ago
- Caffe/C++ implementation of Boundary Equilibrium Generative Adversarial Networks paper for face generation☆21Aug 25, 2017Updated 8 years ago
- My usercode area☆15Dec 21, 2016Updated 9 years ago
- The repo is a source code for the project on Adversarial examples on Semantic Segmentation Networks☆13Sep 12, 2021Updated 4 years ago
- Official implementation of "COExpander: Adaptive Solution Expansion for Combinatorial Optimization".☆23Jun 28, 2025Updated 9 months ago