alevine0 / randomizedAblationLinks
Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.
☆10Updated 3 years ago
Alternatives and similar repositories for randomizedAblation
Users that are interested in randomizedAblation are comparing it to the libraries listed below
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 6 years ago
- ☆18Updated 6 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Updated 7 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆30Updated 5 years ago
- ☆35Updated 4 years ago
- Attacks using out-of-distribution adversarial examples☆11Updated 6 years ago
- Code for Stability Training with Noise (STN)☆22Updated 4 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆45Updated 5 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆24Updated 3 years ago
- ☆48Updated 4 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Updated 5 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Updated 6 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆20Updated 6 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆48Updated 2 years ago
- StrAttack, ICLR 2019☆33Updated 6 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Updated 5 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Updated 7 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30Updated 3 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Updated 5 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
- ☆22Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Updated 4 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Updated last year
- Research prototype of deletion efficient k-means algorithms☆24Updated 5 years ago
- Interval attacks (adversarial ML)☆21Updated 6 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆40Updated 4 years ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated 2 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago