an efficient method for detecting adversarial image examples
☆17Jun 3, 2018Updated 7 years ago
Alternatives and similar repositories for DeepDetector
Users that are interested in DeepDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- PyTorch project example for DL-DIY course at Ecole Polytechnique☆12Feb 25, 2020Updated 6 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Image classification using pytorch on German Traffic Sign data set☆10Jan 10, 2021Updated 5 years ago
- ☆13Dec 9, 2022Updated 3 years ago
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- ☆16Feb 20, 2020Updated 6 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Implementation for "Defense-VAE: A Fast and Accurate Defense against Adversarial Attacks"☆14Dec 23, 2020Updated 5 years ago
- ☆17Oct 22, 2020Updated 5 years ago
- anime face detector and model learner with deep learning.☆15Sep 22, 2015Updated 10 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆43Feb 27, 2020Updated 6 years ago
- vue动态路由,利用addRoute() 而不是addRoutes()☆19Dec 20, 2021Updated 4 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 3 months ago
- Machine Learning course at dsai.asia☆16Aug 17, 2022Updated 3 years ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Sep 18, 2018Updated 7 years ago
- Official implemention of the paper High-Resolution and Precise Counterfactual Medical Image Generation using Language-guided Stable Diffu…☆23Jul 8, 2025Updated 8 months ago
- Pytorch Dataloader - GTSRB (German Traffic Sign Recognition)☆20Apr 16, 2019Updated 6 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- A Semi-supervised learning model (Ladder Network) to classify MNIST digits. A few attacks were executed on it with the target of misclass…☆10Mar 30, 2023Updated 2 years ago
- Mastering PyTorch for Deep Learning, Published by Packt☆14Jan 14, 2021Updated 5 years ago
- Official repository for "Structure-Enhanced Pop Music Generation via Harmony-Aware Learning", ACM MM 2022.☆15Mar 22, 2023Updated 3 years ago
- Iwara网站数据爬取及本地化☆10Nov 23, 2022Updated 3 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- GTNet:Guided Transformer Network for Detecting Human-Object Interactions☆15Apr 4, 2023Updated 2 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- A neural network made for OCR of handwritten uppercase English letters based on Fukushima's 1988 Neocognitron.☆18Jun 5, 2014Updated 11 years ago