Take further steps in the arms race of adversarial examples with only preprocessing.
☆36Aug 4, 2020Updated 5 years ago
Alternatives and similar repositories for Advanced-Gradient-Obfuscating
Users that are interested in Advanced-Gradient-Obfuscating are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆19Sep 29, 2020Updated 5 years ago
- [ACL 2024] The official GitHub repo for the paper "The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Pe…☆82Jul 19, 2024Updated last year
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- The official PyTorch Implementation of the Paper "Adversarial Visual Robustness by Causal Intervention"☆18Oct 6, 2021Updated 4 years ago
- This is the code repository of our submission: Understanding the Dark Side of LLMs’ Intrinsic Self-Correction.☆61Dec 20, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- How should we evaluate supervised hashing☆28Oct 11, 2018Updated 7 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 8 years ago
- This is a tool to delete the remaining dependencies and cache files in the development environment, eg: nodule_modules、target...☆11Jul 22, 2024Updated last year
- ☆10Jan 7, 2026Updated 4 months ago
- The official implementation of the paper SAEdit: Token-level control for continuous image editing via Sparse AutoEncoder☆20Oct 19, 2025Updated 7 months ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Regression Analysis(LS,LASSO,RR,RLS,BR), Clustering(KNN, EM, Mean-shift), Digits Classification☆12Mar 12, 2015Updated 11 years ago
- ☆11Jan 21, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Similarity Learning applied to Speaker Verification and Semantic Textual Similarity☆13Apr 8, 2020Updated 6 years ago
- a general information propagation algorithm for graph learning☆13Jun 15, 2021Updated 4 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- In this paper, we propose Filter Gradient Decent (FGD), an efficient stochastic optimization algorithm that makes a consistent estimation…☆12May 18, 2021Updated 5 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- A community effort to translate fastai video lessons from English to Chinese☆14May 2, 2019Updated 7 years ago
- ☆11Aug 21, 2018Updated 7 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆11Mar 5, 2021Updated 5 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago
- A Domain-Specific Language, Jailbreak Attack Synthesizer and Dynamic LLM Redteaming Toolkit☆27Dec 5, 2024Updated last year
- This is the course project for CSCE585: ML Systems. Students will build their machine learning systems based on the provided infrastructu…☆12Dec 15, 2020Updated 5 years ago
- A package that makes Virtual Makeup easy.☆19Jun 24, 2021Updated 4 years ago
- ☆25May 20, 2020Updated 6 years ago
- A Deep Generative Distance-Based Classifier for Out-of-Domain Detection with Mahalanobis Space☆12Jun 21, 2021Updated 4 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Jun 26, 2021Updated 4 years ago
- Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack CVPR 2021☆15Mar 8, 2024Updated 2 years ago
- ☆15Oct 2, 2024Updated last year
- CARMA Streets is a component of CARMA ecosystem, which enables such a coordination among different transportation users. This component p…☆11Apr 9, 2026Updated last month
- [CVPR2025] Is Your World Simulator a Good Story Presenter? A Consecutive Events-Based Benchmark for Future Long Video Generation☆20May 2, 2025Updated last year
- ☆11Mar 6, 2022Updated 4 years ago
- Source code for ScaleGrad☆19Dec 28, 2021Updated 4 years ago