Take further steps in the arms race of adversarial examples with only preprocessing.
☆36Aug 4, 2020Updated 5 years ago
Alternatives and similar repositories for Advanced-Gradient-Obfuscating
Users that are interested in Advanced-Gradient-Obfuscating are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆19Sep 29, 2020Updated 5 years ago
- [ACL 2024] The official GitHub repo for the paper "The Earth is Flat because...: Investigating LLMs' Belief towards Misinformation via Pe…☆82Jul 19, 2024Updated last year
- An evaluation framework for mitigating DNN backdoor attacks using data augmentations☆11Dec 10, 2020Updated 5 years ago
- The official PyTorch Implementation of the Paper "Adversarial Visual Robustness by Causal Intervention"☆18Oct 6, 2021Updated 4 years ago
- How should we evaluate supervised hashing☆28Oct 11, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Tools for "Another Flip in the Wall"☆40Jun 12, 2018Updated 7 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- This is a tool to delete the remaining dependencies and cache files in the development environment, eg: nodule_modules、target...☆11Jul 22, 2024Updated last year
- ☆10Jan 7, 2026Updated 2 months ago
- The official implementation of the paper SAEdit: Token-level control for continuous image editing via Sparse AutoEncoder☆20Oct 19, 2025Updated 5 months ago
- Benchmarking various sparse convolution libraries: MinkowskiEngine, SpConv, TorchSparse, and Open3D.☆13Apr 10, 2023Updated 2 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Regression Analysis(LS,LASSO,RR,RLS,BR), Clustering(KNN, EM, Mean-shift), Digits Classification☆12Mar 12, 2015Updated 11 years ago
- ☆11Jan 21, 2021Updated 5 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- This repository is the official implementation of the paper "ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning…☆19Jun 7, 2023Updated 2 years ago
- [EMNLP 2024] The official GitHub repo for the paper "Course-Correction: Safety Alignment Using Synthetic Preferences"☆20Oct 2, 2024Updated last year
- Prototypical Concept-based Explanations, accepted at SAIAD workshop at CVPR 2024.☆15Feb 20, 2026Updated last month
- Benchopt benchmark for ResNet fitting on a classification task☆12Sep 19, 2023Updated 2 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆908Jun 10, 2023Updated 2 years ago
- Source code of our submission (Rank 2) for Semi-Supervised Domain Adaptation task in VisDA-2019☆16Oct 10, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Example external repository for interacting with armory.☆11May 2, 2022Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- 5th place solution for ACM MM2021 Robust Logo Detection Grand Challenge☆13Dec 25, 2022Updated 3 years ago
- Source code for EMNLP2022 long paper: Parameter-Efficient Tuning Makes a Good Classification Head☆14Nov 7, 2022Updated 3 years ago
- ☆11Aug 21, 2018Updated 7 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- Compressed Sensing and Sparse Recovery Algorithms and more!☆13Mar 24, 2021Updated 5 years ago
- JSparse is a high-performance auto-differentiation library for sparse voxels computation and point cloud processing based on TorchSparse …☆20Nov 24, 2022Updated 3 years ago
- A flight controller software (firmware) written in Rust and run on linux.☆30Oct 15, 2025Updated 5 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Python wrapper for Time Warped Edit Distance☆18Jan 18, 2021Updated 5 years ago
- A Domain-Specific Language, Jailbreak Attack Synthesizer and Dynamic LLM Redteaming Toolkit☆27Dec 5, 2024Updated last year
- ☆11Mar 5, 2021Updated 5 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago
- For easy metric logging and visualization☆14Jan 31, 2025Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- Understanding the Robustness of Skeleton-based Action Recognition under Adversarial Attack CVPR 2021☆14Mar 8, 2024Updated 2 years ago