NDSS18: Detecting Adversarial Examples in Deep Neural Networks
☆13Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for FeatureSqueezing
Users that are interested in FeatureSqueezing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Experimental Marimo extension for Agentic Notebooks -- integrating AI Agents into the Notebook workflow☆14Oct 11, 2025Updated 6 months ago
- ☆14Dec 27, 2020Updated 5 years ago
- A teeny tiny set of ImageNet-like images for testing pipelines☆10Jan 31, 2018Updated 8 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- ☆10Jun 26, 2023Updated 2 years ago
- ☆10Dec 8, 2023Updated 2 years ago
- an efficient method for detecting adversarial image examples☆17Jun 3, 2018Updated 7 years ago
- ☆11Oct 6, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- convert CHAIN format to PAF format☆15Dec 17, 2024Updated last year
- Python playground for cell-type-specific biology☆12Apr 8, 2026Updated last week
- Makes distinct TSS of each gene from a Gencode annotation☆10Oct 19, 2016Updated 9 years ago
- BayesTME: A reference-free Bayesian method for analyzing spatial transcriptomics data☆14Apr 29, 2025Updated 11 months ago
- Codes for reproducing the experimental results in "CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Net…☆27Jun 23, 2021Updated 4 years ago
- Convert VCF (Variant Call Format) into TCGA MAF (Mutation Annotation Format)☆15Jul 15, 2016Updated 9 years ago
- Caffe re-implementation of dynamic network surgery.☆18Jun 15, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Computational Biology & Bioinformatics Resources☆16Sep 9, 2025Updated 7 months ago
- Clonal reconstruction from HTS data☆10Oct 27, 2021Updated 4 years ago
- Robust Adversarial Perturbation on Deep Proposal-based Models☆25Jul 15, 2022Updated 3 years ago
- ☆16Feb 20, 2020Updated 6 years ago
- Conversations about teaching computational skills to undergraduates☆12Sep 22, 2021Updated 4 years ago
- ECML16: GaKCo: a Fast Gapped k-mer string Kernel using Counting☆14Aug 28, 2019Updated 6 years ago
- Are you being “Comcast-ed”? Test your speed every 5min and see if you're getting what you're paying.☆12Oct 26, 2017Updated 8 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Train word2vec on Pubmed data, compare 2 GO terms, compare 2 genes.☆12Apr 7, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Reproducible Snakemake workflow for benchmarking single-cell chromatin accessibility analysis methods, published in https://doi.org/10.11…☆17Jan 24, 2026Updated 2 months ago
- This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attac…☆33Dec 7, 2018Updated 7 years ago
- Notebooks to accompany sofroniew-vlasov-2015☆10May 18, 2019Updated 6 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- Turkish deasciifier for emacs☆11Jan 14, 2016Updated 10 years ago
- Variant Caller Analysis Dashboard and Data Management System☆36Feb 8, 2016Updated 10 years ago
- Fast API server for calculating linkage disequilibrium☆20Apr 24, 2025Updated 11 months ago