Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)
☆48May 14, 2021Updated 4 years ago
Alternatives and similar repositories for Reverse-Cross-Entropy
Users that are interested in Reverse-Cross-Entropy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Mar 2, 2022Updated 4 years ago
- Max Mahalanobis Training (ICML 2018 + ICLR 2020)☆89Dec 21, 2020Updated 5 years ago
- Adversarial Defense for Ensemble Models (ICML 2019)☆61Nov 28, 2020Updated 5 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆59Jul 7, 2020Updated 5 years ago
- interesting & promising & widely adopted tricks for SOTA performance in machine learning community.☆15Apr 13, 2021Updated 4 years ago
- ☆13Jul 25, 2023Updated 2 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- Code for paper "Exploration in Online Advertising Systems with Deep Uncertainty-Aware Learning"☆63Jul 7, 2023Updated 2 years ago
- Related papers for robust machine learning☆562May 25, 2023Updated 2 years ago
- The official code for Efficient Learning of Generative Models via Finite-Difference Score Matching☆12Nov 22, 2022Updated 3 years ago
- Official code for "On Calibrating Diffusion Probabilistic Models"☆30Feb 22, 2023Updated 3 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- Pytorch for Triple-GAN☆42Dec 8, 2022Updated 3 years ago
- RAMS-Trans: Recurrent Attention Multi-scale Transformer for Fine-grained Image Recognition☆11Dec 14, 2021Updated 4 years ago
- Empirical tricks for training robust models (ICLR 2021)☆258May 25, 2023Updated 2 years ago
- Intriguing Properties of Data Attribution on Diffusion Models (ICLR 2024)☆38Jan 23, 2024Updated 2 years ago
- Related materials for robust and explainable machine learning☆48Jan 29, 2018Updated 8 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Mar 1, 2022Updated 4 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- ☆42May 23, 2023Updated 2 years ago
- code for AAAI accepted paper Similarity Distribution based Membership Inference Attack on Person Re-Identification.☆11Sep 29, 2024Updated last year
- Code release for Your “An Erudite Fine-Grained Visual Classification Model (CVPR 2023)"☆17Jun 2, 2023Updated 2 years ago
- Tensorflow implementation of "Defense against Universal Adversarial Perturbations"☆10Apr 16, 2018Updated 7 years ago
- 🤖在树莓派zero上开发tensorflow-lite的C++环境 | a C++ Environment for Building Tensorflow-lite Projects on Raspberry Pi Zero (armv6)☆10Apr 13, 2021Updated 4 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- [TMLR 2025] On Memorization in Diffusion Models☆30Oct 5, 2023Updated 2 years ago
- Code for the paper "A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks".☆350Aug 13, 2019Updated 6 years ago
- [CVPR-2023] The IEEE/CVF Conference on Computer Vision and Pattern Recognition☆24Sep 18, 2023Updated 2 years ago
- Utility functions for weights and biases (wandb).☆11Sep 17, 2024Updated last year
- Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition, CVPR 2023, Highlight☆45Aug 12, 2023Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆141Aug 23, 2023Updated 2 years ago
- ☆21Jul 25, 2024Updated last year
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- PyTorch Implementation of Adversarial Training for Free!☆249Aug 22, 2021Updated 4 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Aug 25, 2020Updated 5 years ago
- A Self-Consistent Robust Error (ICML 2022)☆69Jun 25, 2023Updated 2 years ago
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago