ajiljalal / manifold-defenseView external linksLinks
☆21Jul 25, 2024Updated last year
Alternatives and similar repositories for manifold-defense
Users that are interested in manifold-defense are comparing it to the libraries listed below
Sorting:
- Code for SegTree Transformer (ICLR-RLGM 2019).☆27Nov 12, 2019Updated 6 years ago
- ☆30Feb 1, 2019Updated 7 years ago
- Learning local search heuristics for Boolean satisfiability☆37May 8, 2024Updated last year
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- Coding exercises for workshop on Breaking the Black Box: Interpreting ML Models☆10Oct 3, 2019Updated 6 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Learning Deep Disentangled Embeddings with the F-Statistic Loss (NIPS 2018)☆10Oct 17, 2018Updated 7 years ago
- yet another reinforcement learning package☆12May 24, 2022Updated 3 years ago
- A repository to get acquainted with basic training tasks in natural language processing and machine learning☆11Dec 27, 2023Updated 2 years ago
- Colab notebooks for d2l-book☆11Dec 5, 2019Updated 6 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- The code for "An online plug-and-play algorithm for regularized image reconstruction", IEEE TCI, 2019.☆10Jan 22, 2020Updated 6 years ago
- The source code of paper “HAZY RE-ID: AN INTERFERENCE SUPPRESSION MODEL FOR DOMAIN ADAPTATION PERSON RE-IDENTIFICATION UNDER INCLEMENT WE…☆12May 26, 2021Updated 4 years ago
- ☆10Oct 28, 2020Updated 5 years ago
- Max Mahalanobis Training (ICML 2018 + ICLR 2020)☆90Dec 21, 2020Updated 5 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- propositional satisfiability problem (SAT) goes neural and deep☆12Aug 17, 2021Updated 4 years ago
- For FFL Blog☆10Sep 24, 2015Updated 10 years ago
- 'Robust Semantic Interpretability: Revisiting Concept Activation Vectors' Official Implementation☆11Jul 15, 2020Updated 5 years ago
- Convert an integer factorization problem into a boolean SATISFIABILITY problem.☆10Jan 14, 2019Updated 7 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- The codebase for Inducing Causal Structure for Interpretable Neural Networks☆11Dec 3, 2021Updated 4 years ago
- A simplified version of MPN☆13May 21, 2021Updated 4 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆19Sep 18, 2025Updated 4 months ago
- HCOMP '22 -- Eliciting and Learning with Soft Labels from Every Annotator☆10Nov 1, 2022Updated 3 years ago
- ☆11Dec 7, 2020Updated 5 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47May 14, 2021Updated 4 years ago
- Code for: Implicit Competitive Regularization in GANs☆116Jan 14, 2022Updated 4 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- An implementation of the prediction strength algorithm from Tibshirani, Walther, Botstein, and Brown's "Cluster validation by prediction …☆18Feb 17, 2011Updated 15 years ago
- ☆11Feb 21, 2022Updated 3 years ago
- ☆10Jan 8, 2020Updated 6 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- On Lipschitz Regularization of Convolutional Layers using Toeplitz Matrix Theory☆10Aug 19, 2021Updated 4 years ago
- ☆10May 3, 2022Updated 3 years ago
- Code and data from the paper "Targeted Nonlinear Adversarial Perturbations in Images and Videos".☆11Sep 8, 2018Updated 7 years ago
- Connected Component Labelling tutorial☆11Aug 11, 2016Updated 9 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- A Codebook-Driven Approach for Low-Light Image Enhancement☆26Nov 7, 2025Updated 3 months ago