SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations
☆14Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for SmoothFool
Users that are interested in SmoothFool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Aug 3, 2021Updated 4 years ago
- Tensorflow implementation of Unsupervised learning of object landmarks by factorized spatial embeddings☆30Feb 19, 2019Updated 7 years ago
- Code for computing the hidden biases in deep networks and its applications☆14Feb 23, 2023Updated 3 years ago
- Graph Knowledge Distillation☆13Mar 6, 2020Updated 6 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- ☆17Aug 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆35Dec 16, 2022Updated 3 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- A repository to caculate the just noticable difference of an image by Python☆28Mar 25, 2021Updated 5 years ago
- This repository contains the code for our CVPR 2022 paper on "Non-isotropy Regularization for Proxy-based Deep Metric Learning".☆15Mar 10, 2023Updated 3 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- This is our implementation for ALDI.☆14Feb 5, 2023Updated 3 years ago
- This is the official repository of our NeurIPS 2025 paper "MaxSup: Overcoming Representation Collapse in Label Smoothing"☆22Nov 6, 2025Updated 5 months ago
- ☆16Mar 31, 2025Updated last year
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆143Oct 2, 2020Updated 5 years ago
- Trained model weights, training and evaluation code from the paper "A simple way to make neural networks robust against diverse image cor…☆62May 24, 2023Updated 2 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- Keys for Programming Assignments of Coursera Course Deep Learning Specialization by Andrew Ng☆20Jan 12, 2019Updated 7 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- ☆23Sep 1, 2020Updated 5 years ago
- A simple and accurate method to fool deep neural networks☆363Mar 31, 2020Updated 6 years ago
- Improving the Generalization of Adversarial Training with Domain Adaptation☆33Feb 25, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Official Implementation of "Subjective and Objective Quality of Experiment of Free Viewpoint Videos"☆12Oct 27, 2022Updated 3 years ago
- ☆14Mar 5, 2026Updated last month
- Self-hosted Todolist app written in Python☆10Apr 16, 2021Updated 4 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Pytorch plugin to generate saliency maps for neural networks☆12Nov 1, 2018Updated 7 years ago