A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.
☆15Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for Comdefend_tensorflow
Users that are interested in Comdefend_tensorflow are comparing it to the libraries listed below
Sorting:
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆115Jul 7, 2022Updated 3 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- ☆11Apr 27, 2022Updated 3 years ago
- ☆22Jul 28, 2020Updated 5 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆16May 6, 2020Updated 5 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆22Mar 20, 2022Updated 3 years ago
- Getting Starting with NIMBUS-CORE☆10Dec 16, 2023Updated 2 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Dec 4, 2022Updated 3 years ago
- Using Cartesian Genetic Programming to find an efficient Convolutional Neural Network architecture☆26Feb 6, 2018Updated 8 years ago
- Official repository for "Bridging Adversarial Robustness and Gradient Interpretability".☆30May 2, 2019Updated 6 years ago
- Pytorch - Adversarial Training☆26May 9, 2018Updated 7 years ago
- ☆12May 6, 2022Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- Datacenter simulation toolkit for the OpenDC project☆10Aug 24, 2020Updated 5 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- (TG'2023) Official code for the paper "Revisiting of AlphaStar" (previously called "Rethinking of AlphaStar"). It compares the raw interf…☆10Sep 6, 2021Updated 4 years ago
- Code for the paper "Learning Step-Size Adaptation in CMA-ES"☆12Mar 24, 2023Updated 2 years ago
- ☆10Dec 18, 2024Updated last year
- ☆20Feb 3, 2025Updated last year
- ☆10Jan 7, 2026Updated last month
- This simulator models multi core systems, intended primarily for studies on main memory management techniques. It models a trace-based ou…☆12Jan 18, 2016Updated 10 years ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- Code for Fast Propagation is Better: Accelerating Single-Step Adversarial Training via Sampling Subnetworks (TIFS2024)☆13Mar 29, 2024Updated last year
- Quicksilver superpage management system☆11May 14, 2021Updated 4 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆13Dec 16, 2024Updated last year
- Prompt Generator model for Stable Diffusion Models☆11Jun 20, 2023Updated 2 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- ☆12Nov 16, 2022Updated 3 years ago
- EAST: An Efficient and Accurate Scene Text Detector☆15Jan 22, 2018Updated 8 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- 一个用tikz绘制多维评价雷达图的自定义环境,以便于在LaTeX绘制多维评价雷达图。☆12Jan 5, 2019Updated 7 years ago
- Validation Generation for Kubeflow CRD on Kubernetes☆11Jan 25, 2021Updated 5 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago