alevine0 / randomizedAblation
Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.
☆10Updated 2 years ago
Alternatives and similar repositories for randomizedAblation:
Users that are interested in randomizedAblation are comparing it to the libraries listed below
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- ☆18Updated 5 years ago
- An (imperfect) implementation of wide resnets and Parseval regularization☆9Updated 4 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- ☆11Updated 5 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30Updated 2 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆44Updated 5 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆28Updated 5 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆72Updated 9 months ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated 2 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆23Updated 2 years ago
- Code for Stability Training with Noise (STN)☆21Updated 4 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Updated 3 years ago
- ☆47Updated 4 years ago
- ☆35Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆31Updated 4 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Updated 5 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Updated 5 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆55Updated 3 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆41Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- ☆19Updated 3 years ago
- ☆16Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆37Updated 4 years ago