[ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference"
☆14Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for DeepSloth
Users that are interested in DeepSloth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Early exit ensembles☆12Dec 4, 2021Updated 4 years ago
- Source Code for ICML 2019 Paper "Shallow-Deep Networks: Understanding and Mitigating Network Overthinking"☆37Dec 22, 2023Updated 2 years ago
- [ICLR 2020] ”Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by Enabling Input-Adaptive Inference“☆24Dec 30, 2021Updated 4 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆39Jul 22, 2024Updated last year
- ☆12Sep 17, 2022Updated 3 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- The code of our paper "Misbehaviour Prediction for Autonomous Driving Systems", including our improved Udacity simulator☆21Jun 30, 2021Updated 4 years ago
- Multivariate Electricity Consumption Prediction with Extreme Learning Machine☆10Jun 25, 2018Updated 7 years ago
- (KDD’24) Using Self-Supervised Learning Can Improve Model Fairness.☆11Jun 5, 2024Updated last year
- Papers I have collected and read in undergraduate and graduate period☆56Sep 6, 2023Updated 2 years ago
- ☆47Dec 26, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 7 months ago
- Comparison of classification algorithms for the task of Facial Expression Recognition. Also includes real-time Facial Expression Recognit…☆12Apr 27, 2023Updated 2 years ago
- This project attacked widely-used EEG spellers, e.g., P300 spellers and SSVEP spellers, with adversarial perturbation templates. We cons…☆14Jul 14, 2020Updated 5 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆379Feb 5, 2023Updated 3 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- A Jupyter Notebook demonstrating how to use a multi-modal embedding model to build an image search engine.☆13Jan 29, 2024Updated 2 years ago
- An implementation of the paper 'Using Deep Networks for Scientific Discovery in Physiological Signals'☆12Aug 24, 2020Updated 5 years ago
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 4 months ago
- Enhancing Efficiency in Multidevice Federated Learning through Data Selection☆13Apr 15, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆18Nov 15, 2022Updated 3 years ago
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- Implementation of ICLR 2017 paper "Loss-aware Binarization of Deep Networks"☆20Feb 24, 2019Updated 7 years ago
- DNN partition edge-cloud co-infer☆12Jun 11, 2023Updated 2 years ago
- Investigating and Defending Shortcut Learning in Personalized Diffusion Models☆14Nov 19, 2024Updated last year
- FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings☆13Apr 12, 2023Updated 3 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- [NeurIPS 2021] Source code for the paper "Qu-ANTI-zation: Exploiting Neural Network Quantization for Achieving Adversarial Outcomes"☆18Nov 9, 2021Updated 4 years ago
- Proof-of-concept implementation of the Obelix software hardening framework, based on LLVM.☆12May 22, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ROCT-Net: A new ensemble deep convolutional model with improved spatial resolution learning for detecting common diseases from retinal OC…☆12Mar 3, 2022Updated 4 years ago
- (HotMobile'24) Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile Computing☆17Jan 22, 2024Updated 2 years ago
- Code for "Adversarial Distillation of Bayesian Neural Network Posteriors" https://arxiv.org/abs/1806.10317☆16Oct 31, 2018Updated 7 years ago
- ☆35Feb 9, 2021Updated 5 years ago
- ☆15Jan 8, 2024Updated 2 years ago
- ECM Factorization on CUDA-GPUs☆14Sep 29, 2020Updated 5 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated last year