☆21Jul 25, 2024Updated last year
Alternatives and similar repositories for manifold-defense
Users that are interested in manifold-defense are comparing it to the libraries listed below
Sorting:
- Code for SegTree Transformer (ICLR-RLGM 2019).☆27Nov 12, 2019Updated 6 years ago
- ☆25May 6, 2021Updated 4 years ago
- ☆30Feb 1, 2019Updated 7 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- Code for our paper "Active Perception using Light Curtains for Autonomous Driving", ECCV 2020☆10Dec 7, 2021Updated 4 years ago
- yet another reinforcement learning package☆12May 24, 2022Updated 3 years ago
- ☆11Oct 29, 2024Updated last year
- ChatGPT solutions for the MLE interview☆14Dec 9, 2022Updated 3 years ago
- Learning Deep Disentangled Embeddings with the F-Statistic Loss (NIPS 2018)☆10Oct 17, 2018Updated 7 years ago
- The source code of paper “HAZY RE-ID: AN INTERFERENCE SUPPRESSION MODEL FOR DOMAIN ADAPTATION PERSON RE-IDENTIFICATION UNDER INCLEMENT WE…☆12May 26, 2021Updated 4 years ago
- The code for "An online plug-and-play algorithm for regularized image reconstruction", IEEE TCI, 2019.☆10Jan 22, 2020Updated 6 years ago
- Colab notebooks for d2l-book☆11Dec 5, 2019Updated 6 years ago
- A repository to get acquainted with basic training tasks in natural language processing and machine learning☆11Dec 27, 2023Updated 2 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- A preliminary effort for https://github.com/fumin/ntm☆11Mar 1, 2015Updated 11 years ago
- Single shot neural network pruning before training the model, based on connection sensitivity☆11Aug 7, 2019Updated 6 years ago
- Max Mahalanobis Training (ICML 2018 + ICLR 2020)☆90Dec 21, 2020Updated 5 years ago
- ☆11Dec 7, 2020Updated 5 years ago
- propositional satisfiability problem (SAT) goes neural and deep☆12Aug 17, 2021Updated 4 years ago
- For FFL Blog☆10Sep 24, 2015Updated 10 years ago
- Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing☆14Feb 18, 2021Updated 5 years ago
- A simplified version of MPN☆13May 21, 2021Updated 4 years ago
- ☆14Jun 9, 2021Updated 4 years ago
- This is the implementation for IEEE S&P 2022 paper "Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Secur…☆11Aug 24, 2022Updated 3 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 2 years ago
- ☆12May 27, 2022Updated 3 years ago
- HCOMP '22 -- Eliciting and Learning with Soft Labels from Every Annotator☆10Nov 1, 2022Updated 3 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47May 14, 2021Updated 4 years ago
- Code for: Implicit Competitive Regularization in GANs☆116Jan 14, 2022Updated 4 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- A Codebook-Driven Approach for Low-Light Image Enhancement☆27Nov 7, 2025Updated 4 months ago
- The code for our NeurIPS 2021 paper "Kernelized Heterogeneous Risk Minimization".☆13Oct 13, 2021Updated 4 years ago
- 计算机学报-“一种基于MR-VAR的低照度图像增强方法”☆13Oct 20, 2022Updated 3 years ago
- Code for using TOTEM on EEG data☆15Sep 24, 2025Updated 5 months ago
- ☆10Jun 11, 2020Updated 5 years ago
- Connected Component Labelling tutorial☆11Aug 11, 2016Updated 9 years ago
- On Lipschitz Regularization of Convolutional Layers using Toeplitz Matrix Theory☆10Aug 19, 2021Updated 4 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago