an efficient method for detecting adversarial image examples
☆17Jun 3, 2018Updated 7 years ago
Alternatives and similar repositories for DeepDetector
Users that are interested in DeepDetector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- ☆13Dec 9, 2022Updated 3 years ago
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆38Nov 22, 2022Updated 3 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆16Feb 15, 2022Updated 4 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- ☆10Jan 31, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆17Oct 22, 2020Updated 5 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆43Feb 27, 2020Updated 6 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 4 months ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Official implemention of the paper High-Resolution and Precise Counterfactual Medical Image Generation using Language-guided Stable Diffu…☆23Jul 8, 2025Updated 9 months ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆51Sep 18, 2018Updated 7 years ago
- A set of advanced image editing tools.☆12Jun 21, 2016Updated 9 years ago
- ☆34Sep 1, 2025Updated 8 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- A neural network made for OCR of handwritten uppercase English letters based on Fukushima's 1988 Neocognitron.☆18Jun 5, 2014Updated 11 years ago
- ☆19Jul 21, 2019Updated 6 years ago
- PyTorch implementation of a self-attentive speaker embedding☆17Sep 24, 2019Updated 6 years ago
- Type-Specific Adversarial Attack for Object Detection☆13Aug 27, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- An adversarial attack on object detectors☆147Oct 12, 2021Updated 4 years ago
- ☆11Apr 29, 2018Updated 8 years ago
- Iwara网站数据爬取及本地化☆11Nov 23, 2022Updated 3 years ago
- ☆19Mar 19, 2023Updated 3 years ago
- Simple sinc interpolation in PyTorch.☆15Jul 8, 2023Updated 2 years ago
- My usercode area☆15Dec 21, 2016Updated 9 years ago