[ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference"
☆15Feb 16, 2022Updated 4 years ago
Alternatives and similar repositories for DeepSloth
Users that are interested in DeepSloth are comparing it to the libraries listed below
Sorting:
- Early exit ensembles☆12Dec 4, 2021Updated 4 years ago
- Source Code for ICML 2019 Paper "Shallow-Deep Networks: Understanding and Mitigating Network Overthinking"☆37Dec 22, 2023Updated 2 years ago
- [ICLR 2020] ”Triple Wins: Boosting Accuracy, Robustness and Efficiency Together by Enabling Input-Adaptive Inference“☆24Dec 30, 2021Updated 4 years ago
- ☆12Sep 17, 2022Updated 3 years ago
- Code for the paper "Bias-Reduced Uncertainty Estimation for Deep Neural Classifiers" published in ICLR 2019☆14Apr 25, 2019Updated 6 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Dec 8, 2022Updated 3 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- The code of our paper "Misbehaviour Prediction for Autonomous Driving Systems", including our improved Udacity simulator☆21Jun 30, 2021Updated 4 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- Addressing the problem of predicting crime occurrence based on historic records☆11Nov 27, 2019Updated 6 years ago
- Pytorch implementation of Bit-Flip based adversarial weight Attack (BFA)☆33Jul 3, 2021Updated 4 years ago
- ☆13Jun 18, 2025Updated 8 months ago
- TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classifica…☆303Aug 25, 2025Updated 6 months ago
- Code for ICML21 paper "Learning Self-Modulating Attention in Continuous Time Space with Applications to Sequential Recommendation"☆12Feb 8, 2023Updated 3 years ago
- Lifelong machine learning is a novel machine learning paradigm which continually learns tasks and accumulates knowledge for reusing. The …☆10Sep 15, 2019Updated 6 years ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- The official PyTorch implementation of "An Attentional Multi-scale Co-evolving Model for Dynamic Link Prediction" (TheWebConf'23)☆11May 4, 2023Updated 2 years ago
- KL-loss☆10Oct 14, 2019Updated 6 years ago
- DNN partition edge-cloud co-infer☆12Jun 11, 2023Updated 2 years ago
- This is the code of paper: Robust Mid-Pass Filtering Graph Convolutional Networks.(paper accepted by WWW2023)☆13Feb 17, 2023Updated 3 years ago
- Mitigating the Filter Bubble while Maintaining Relevance: Targeted Diversification with VAE-based Recommender Systems☆10Mar 15, 2023Updated 2 years ago
- "SCONE: A Novel Stochastic Sampling to Generate Contrastive Views and Hard Negative Samples for Recommendation", WSDM 2025☆14Nov 25, 2025Updated 3 months ago
- ☆11Jul 20, 2021Updated 4 years ago
- ☆11Jan 7, 2025Updated last year
- This repository reproduces the results in the paper "How expressive are transformers in spectral domain for graphs?"(published in TMLR)☆12Jul 10, 2022Updated 3 years ago
- Graphical intuition to MOSFET square-law☆11Jan 5, 2021Updated 5 years ago
- Code for AAAI21 paper "Scalable and Explainable 1-Bit Matrix Completion via Graph Signal Learning"☆11Feb 15, 2022Updated 4 years ago
- Code for paper "EdgeKE: An On-Demand Deep Learning IoT System for Cognitive Big Data on Industrial Edge Devices"☆11Aug 22, 2025Updated 6 months ago
- ☆10Mar 24, 2022Updated 3 years ago
- ☆42Jan 25, 2024Updated 2 years ago
- ☆34Feb 9, 2021Updated 5 years ago
- Official data release to reproduce Confident Learning paper results☆40Feb 17, 2022Updated 4 years ago
- Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.☆378Feb 5, 2023Updated 3 years ago
- Code and checkpoints of compressed networks for the paper titled "HYDRA: Pruning Adversarially Robust Neural Networks" (NeurIPS 2020) (ht…☆91Dec 22, 2022Updated 3 years ago
- Owl Eyes: Spotting UI Display Issues via Visual Understanding☆11Jul 31, 2020Updated 5 years ago
- Material for the course of "Mathematics of Transformer"☆19Aug 3, 2025Updated 7 months ago