aam-at / adversary_criticLinks
☆13Updated 4 years ago
Alternatives and similar repositories for adversary_critic
Users that are interested in adversary_critic are comparing it to the libraries listed below
Sorting:
- Related materials for robust and explainable machine learning☆48Updated 7 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆85Updated 7 years ago
- NIPS Adversarial Vision Challenge☆41Updated 6 years ago
- On the decision boundary of deep neural networks☆38Updated 6 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆91Updated 2 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 4 years ago
- Code for the paper 'Understanding Measures of Uncertainty for Adversarial Example Detection'☆61Updated 7 years ago
- Ensemble Adversarial Training on MNIST☆121Updated 7 years ago
- ☆25Updated 5 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆62Updated 5 years ago
- ☆63Updated 8 years ago
- ☆31Updated 4 years ago
- Variational Auto Encoder☆39Updated 8 years ago
- Pytorch Adversarial Attack Framework☆78Updated 6 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 5 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Updated 6 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Updated 7 years ago
- Public code for a paper "Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks."☆34Updated 6 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆109Updated 7 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆81Updated 10 months ago
- ☆87Updated 10 months ago
- Variance Networks: When Expectation Does Not Meet Your Expectations, ICLR 2019☆39Updated 5 years ago
- Tensorflow Implementation of Adversarial Attack to Capsule Networks☆172Updated 7 years ago
- Interpretation of Neural Network is Fragile☆36Updated last year
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Updated 5 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆74Updated 6 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆128Updated 5 years ago
- Learning kernels to maximize the power of MMD tests☆210Updated 7 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆26Updated 5 years ago