Defense GAN in pytorch
☆13May 12, 2019Updated 6 years ago
Alternatives and similar repositories for DefenseGAN
Users that are interested in DefenseGAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆247Oct 24, 2019Updated 6 years ago
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Jul 19, 2022Updated 3 years ago
- ☆43May 21, 2020Updated 5 years ago
- Direct Gibbs sampling for DPMM using python.☆17Jun 2, 2017Updated 8 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- Simple but powerful code for image retrieval task using triplet loss☆10Sep 19, 2021Updated 4 years ago
- Image Decomposition in GAN network(Reference:Deep Adversarial Decomposition: A Unified Framework for Separating Superimposed Images, CVPR…☆17Jul 15, 2020Updated 5 years ago
- [ICMI2017] EmotiW 2017 Challenge (INHA University)☆10Jun 10, 2018Updated 7 years ago
- DISSECT: Disentangled Simultaneous Explanations via Concept Traversals☆12Feb 5, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pytorch classification with Cifar-10, Cifar-100, and STL-10☆14Jul 24, 2019Updated 6 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆16Apr 24, 2022Updated 4 years ago
- PyTorch implementation of Continuous Speech Separation☆12Oct 5, 2022Updated 3 years ago
- Adversarial Defense, Adversarial Attack, Face Recognition, Learnable PCA, Pytorch☆15Aug 3, 2022Updated 3 years ago
- Global Open Simulator☆10May 5, 2025Updated 11 months ago
- Directional sparse filtering for blind speech separation☆10Jun 8, 2021Updated 4 years ago
- Python工具☆16Apr 26, 2020Updated 6 years ago
- [AAAI2021] A repository of Contrastive Adversarial Learning for Person-independent FER☆16Jan 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- Some PyTorch code for the Kaggle Speech Recognition Challenge☆13Feb 7, 2019Updated 7 years ago
- Dirichlet Process Mixture Models☆22Jul 31, 2016Updated 9 years ago
- ☆14Jun 5, 2020Updated 5 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- Implement of neural networks on 'UC Merced Land Use' dataset with PyTorch☆17Jan 3, 2020Updated 6 years ago
- ☆10Oct 25, 2019Updated 6 years ago
- ☆21Nov 19, 2021Updated 4 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆32Mar 2, 2023Updated 3 years ago
- ECCV2024: Adversarial Prompt Tuning for Vision-Language Models☆31Mar 7, 2026Updated last month
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆25Dec 16, 2025Updated 4 months ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆21May 21, 2019Updated 6 years ago
- Code for paper: “What Data Benefits My Classifier?” Enhancing Model Performance and Interpretability through Influence-Based Data Selecti…☆23May 17, 2024Updated last year
- This demonstrates the hijacking of the "write" system call and how to set the System Call table to read/write mode via modifying the corr…☆19Jun 2, 2014Updated 11 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago