☆17Sep 25, 2019Updated 6 years ago
Alternatives and similar repositories for adversarial-robustness-benchmark
Users that are interested in adversarial-robustness-benchmark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarially Robust Generalization Just Requires More Unlabeled Data☆11Aug 8, 2019Updated 6 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆15May 6, 2020Updated 5 years ago
- Short Summaries for papers in Adversarial Attacks and Defenses. Linked to a related blog post:☆28Sep 11, 2019Updated 6 years ago
- Reward Estimation for Variance Reduction in Deep Reinforcement Learning☆10May 8, 2018Updated 7 years ago
- ☆10Sep 25, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass the Censorship of Text-to-Image Generation Mode☆17Feb 16, 2025Updated last year
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆59Jul 7, 2020Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset☆19Apr 29, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆22Jul 12, 2021Updated 4 years ago
- Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural trai…☆175May 3, 2024Updated last year
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆39Jan 4, 2019Updated 7 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Self-Distillation with weighted ground-truth targets; ResNet and Kernel Ridge Regression☆19Oct 12, 2021Updated 4 years ago
- CVPR 2019 paper "Disentangling Adversarial Robustness and Generalization".☆14Oct 28, 2019Updated 6 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆141Aug 23, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆63Jan 14, 2020Updated 6 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- Related papers for robust machine learning☆562May 25, 2023Updated 2 years ago
- ☆15Dec 4, 2019Updated 6 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- Similarity Learning applied to Speaker Verification and Semantic Textual Similarity☆13Apr 8, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Nov 17, 2020Updated 5 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- A Toolbox for Adversarial Robustness Research☆1,362Sep 14, 2023Updated 2 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- ☆26Jun 4, 2025Updated 9 months ago