Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.
☆10Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for randomizedAblation
Users that are interested in randomizedAblation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- CVPR 2019 paper "Disentangling Adversarial Robustness and Generalization".☆14Oct 28, 2019Updated 6 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- VHTest☆16Oct 31, 2024Updated last year
- Efficient minimax optimization for deep adversarial learning, and more.☆10Mar 28, 2019Updated 6 years ago
- ☆11Jan 2, 2020Updated 6 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Jul 16, 2021Updated 4 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- Create PDF animations from graphics files and inline graphics using LaTeX☆12Jun 8, 2018Updated 7 years ago
- Imagenet dataset for pytorch☆23Jan 15, 2019Updated 7 years ago
- [NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning☆35Feb 22, 2021Updated 5 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆31Jan 5, 2020Updated 6 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- ☆11Jul 27, 2018Updated 7 years ago
- ☆11Oct 2, 2020Updated 5 years ago
- Self-Supervised Domain Adaptation with Consistency Training☆19Oct 28, 2020Updated 5 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- Code for paper "Bridging Imagination and Reality for Model-Based Deep Reinforcement Learning".☆14May 23, 2021Updated 4 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Codes for paper <InteL-VAEs: Adding Inductive Biases to VariationalAuto-Encoders via Intermediary Latents>.☆18Jun 25, 2021Updated 4 years ago
- The Shape of Data: Intrinsic Distance for Comparing Data Distributions☆12Sep 25, 2019Updated 6 years ago
- Implementing use-based privacy for ubiquitous computing.☆18Jun 26, 2025Updated 8 months ago
- Code for L4DC 2022 paper: Joint Synthesis of Safety Certificate and Safe Control Policy Using Constrained Reinforcement Learning.☆15Jul 31, 2023Updated 2 years ago
- Proof of Concept of a Federated Learning framework that maintains the privacy of the participants involved.☆14Feb 4, 2026Updated last month
- Predicting Air Quality from Webcam Images with Deep Learning☆10Jan 19, 2019Updated 7 years ago
- Hands-On Deep Learning for IoT, published by Packt☆31Jan 30, 2023Updated 3 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- This repository includes a realization of the resilient projection-based consensus actor-critic algorithm that is resilient to adversaria…☆11May 23, 2022Updated 3 years ago
- ☆19Jul 21, 2019Updated 6 years ago
- Code for the paper: On Symmetric Losses for Learning from Corrupted Labels☆19May 11, 2019Updated 6 years ago
- Pytorch package for geometric softmax☆12Jun 13, 2019Updated 6 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- ☆12Aug 21, 2020Updated 5 years ago
- an efficient method for detecting adversarial image examples☆17Jun 3, 2018Updated 7 years ago
- [Archived] Move to agentsociety☆17Feb 6, 2025Updated last year
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago