☆21Jul 25, 2024Updated last year
Alternatives and similar repositories for manifold-defense
Users that are interested in manifold-defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for SegTree Transformer (ICLR-RLGM 2019).☆27Nov 12, 2019Updated 6 years ago
- ☆25May 6, 2021Updated 4 years ago
- ☆13Apr 20, 2023Updated 2 years ago
- Synthetic Data Generation for Evaluation☆14Feb 21, 2025Updated last year
- Code for: Implicit Competitive Regularization in GANs☆116Jan 14, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆31Feb 1, 2019Updated 7 years ago
- ☆10Oct 28, 2020Updated 5 years ago
- [ICLR 2025] Official Implementation: "Ambient Diffusion Posterior Sampling: Solving Inverse Problems with Diffusion Models trained on Cor…☆23Feb 27, 2025Updated last year
- Official release of code for the paper RL is a hammer and LLMs are nails A simple RL approach to stronger prompt injection attacks☆43Updated this week
- Official Code for ICLR2022 Paper: Chaos is a Ladder: A New Theoretical Understanding of Contrastive Learning via Augmentation Overlap☆28Sep 28, 2025Updated 6 months ago
- ☆11Oct 29, 2024Updated last year
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- Code for our paper "Active Perception using Light Curtains for Autonomous Driving", ECCV 2020☆10Dec 7, 2021Updated 4 years ago
- ☆12May 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Max Mahalanobis Training (ICML 2018 + ICLR 2020)☆89Dec 21, 2020Updated 5 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- ☆34Oct 21, 2025Updated 5 months ago
- a naive static http server that solves C10K problem☆17Jan 8, 2017Updated 9 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- The official implementation of the paper "AgentDyn: A Dynamic Open-Ended Benchmark for Evaluating Prompt Injection Attacks of Real-World …☆45Apr 9, 2026Updated last week
- Code of "Visualizing and Understanding Object Detecor"☆20Jun 24, 2021Updated 4 years ago
- Convert an integer factorization problem into a boolean SATISFIABILITY problem.☆10Jan 14, 2019Updated 7 years ago
- [USENIX Security 2025] SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks☆20Sep 18, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Codes for the paper "Optimizing Mode Connectivity via Neuron Alignment" from NeurIPS 2020.☆16Dec 10, 2020Updated 5 years ago
- Co-training for Policy Learning☆13Aug 8, 2019Updated 6 years ago
- Learning Deep Disentangled Embeddings with the F-Statistic Loss (NIPS 2018)☆10Oct 17, 2018Updated 7 years ago
- ☆12Feb 21, 2022Updated 4 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- A curated list of disentanglement in NLP. :-)☆17Oct 31, 2021Updated 4 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- ☆16Sep 4, 2024Updated last year
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆19Mar 10, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The code for "An online plug-and-play algorithm for regularized image reconstruction", IEEE TCI, 2019.☆10Jan 22, 2020Updated 6 years ago
- Disconnected Manifold Learning for Generative Adversarial Networks.☆13Jan 10, 2019Updated 7 years ago
- This is the official Gtihub repo for our paper: "BEEAR: Embedding-based Adversarial Removal of Safety Backdoors in Instruction-tuned Lang…☆22Jul 3, 2024Updated last year
- This is the repository for USENIX Security 2023 paper "Hard-label Black-box Universal Adversarial Patch Attack".☆15Sep 5, 2023Updated 2 years ago
- Using GNN and DQN to find a baetter branching heuristic for a CDCL Solver☆54Oct 20, 2020Updated 5 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆20Jan 27, 2024Updated 2 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 4 years ago