Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)
☆22Dec 30, 2019Updated 6 years ago
Alternatives and similar repositories for JARN_ICLR2020
Users that are interested in JARN_ICLR2020 are comparing it to the libraries listed below
Sorting:
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Mar 24, 2023Updated 2 years ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 4 months ago
- Convex Layerwise Adversarial Training (COLT)☆29Jan 13, 2021Updated 5 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- ☆16Dec 4, 2019Updated 6 years ago
- ☆14Jun 5, 2020Updated 5 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆22Mar 20, 2022Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- ☆48Mar 31, 2020Updated 5 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆49Dec 30, 2021Updated 4 years ago
- Code for "Mixed Cross Entropy Loss for Neural Machine Translation"☆20Jul 23, 2021Updated 4 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Dec 23, 2020Updated 5 years ago
- Reproduced the popular Facebook game -- Tetris Battle! Also provided openAI environments.☆23Dec 7, 2020Updated 5 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- statnlp-neural☆32Sep 26, 2019Updated 6 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 5 years ago
- Code for ECCV 2022 paper "Can Shuffling Video Benefit Temporal Bias Problem: A Novel Training Framework for Temporal Grounding"☆29May 31, 2023Updated 2 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆506Aug 30, 2021Updated 4 years ago
- Implementation of Methods Proposed in Preventing Gradient Attenuation in Lipschitz Constrained Convolutional Networks (NeurIPS 2019)☆36Jun 25, 2020Updated 5 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- ☆37Sep 16, 2024Updated last year
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- The official repo for "CodeScaler: Scaling Code LLM Training and Test-Time Inference via Execution-Free Reward Models"☆30Updated this week
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- ☆36Apr 14, 2021Updated 4 years ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Neural network sequence labeling model - some sloppy modifications to the original toolkit to enable punctuation restoration in unsegment…☆10Jan 8, 2017Updated 9 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆12Jun 18, 2024Updated last year
- ☆10Sep 25, 2019Updated 6 years ago
- ACL'2023: Few-shot Event Detection: An Empirical Study and a Unified View☆11Mar 13, 2024Updated last year
- ☆10Jul 21, 2023Updated 2 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- Unsupervised Cross-lingual Sentiment Analysis (CoNLL 2019)☆10Nov 4, 2019Updated 6 years ago
- Finding Camouflaged Needle in a Haystack? Pornographic Products Detection via Berrypicking Tree Model☆10Jul 29, 2019Updated 6 years ago
- ☆10May 20, 2019Updated 6 years ago