[ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference"
☆15Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for DeepSloth
Users that are interested in DeepSloth are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Early exit ensembles☆12Dec 4, 2021Updated 4 years ago
- Source Code for ICML 2019 Paper "Shallow-Deep Networks: Understanding and Mitigating Network Overthinking"☆37Dec 22, 2023Updated 2 years ago
- [ICLR 2020] ”Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by Enabling Input-Adaptive Inference“☆24Dec 30, 2021Updated 4 years ago
- Code for the paper "Bias-Reduced Uncertainty Estimation for Deep Neural Classifiers" published in ICLR 2019☆13Apr 25, 2019Updated 6 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Jul 3, 2021Updated 4 years ago
- ☆12Sep 17, 2022Updated 3 years ago
- Official implementation for “SafeMVDrive: Multi-view Safety-Critical Driving Video Synthesis in the Real World Domain”☆22Dec 11, 2025Updated 3 months ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- CNCA: Toward Customizable and Natural Generation of Adversarial Camouflage for Vehicle Detectors☆15Nov 3, 2024Updated last year
- ☆10Mar 24, 2022Updated 4 years ago
- The code of our paper "Misbehaviour Prediction for Autonomous Driving Systems", including our improved Udacity simulator☆21Jun 30, 2021Updated 4 years ago
- ☆11Jun 19, 2024Updated last year
- Owl Eyes: Spotting UI Display Issues via Visual Understanding☆11Jul 31, 2020Updated 5 years ago
- Multivariate Electricity Consumption Prediction with Extreme Learning Machine☆10Jun 25, 2018Updated 7 years ago
- (KDD’24) Using Self-Supervised Learning Can Improve Model Fairness.☆11Jun 5, 2024Updated last year
- Papers I have collected and read in undergraduate and graduate period☆55Sep 6, 2023Updated 2 years ago
- ☆47Dec 26, 2019Updated 6 years ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆302Aug 25, 2025Updated 6 months ago
- Comparison of classification algorithms for the task of Facial Expression Recognition. Also includes real-time Facial Expression Recognit…☆12Apr 27, 2023Updated 2 years ago
- Changing several bit which overwhelms the quantized CNN☆45Oct 26, 2019Updated 6 years ago
- This project attacked widely-used EEG spellers, e.g., P300 spellers and SSVEP spellers, with adversarial perturbation templates. We cons…☆14Jul 14, 2020Updated 5 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆379Feb 5, 2023Updated 3 years ago
- The E-UNet is a powerful architecture for real-time semantic segmentation, especially if one wants to run it in low-resource embedded sys…☆10Dec 31, 2020Updated 5 years ago
- Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux☆10Oct 2, 2021Updated 4 years ago
- A Jupyter Notebook demonstrating how to use a multi-modal embedding model to build an image search engine.☆13Jan 29, 2024Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- [ICML 2024] RAUCA: A robust and accurate adversarial camouflage generation method☆25Nov 29, 2025Updated 3 months ago
- An implementation of the paper 'Using Deep Networks for Scientific Discovery in Physiological Signals'☆12Aug 24, 2020Updated 5 years ago
- Code for the paper "BERT Loses Patience: Fast and Robust Inference with Early Exit".☆66Jun 19, 2021Updated 4 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- Deep neural network (DNN) implementation for inference tasks☆13Jul 4, 2019Updated 6 years ago
- Enhancing Efficiency in Multidevice Federated Learning through Data Selection☆13Apr 15, 2024Updated last year
- Eliminating Keystroke Timing Attacks☆22Dec 12, 2017Updated 8 years ago
- Implementation of ICLR 2017 paper "Loss-aware Binarization of Deep Networks"☆20Feb 24, 2019Updated 7 years ago