Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
☆19Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for translearn
Users that are interested in translearn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ICML Workshop 18 - Auto-Classification of Retinal Diseases in the Limit of Sparse Data Using a Two-Streams Machine Learning Model☆17Jun 22, 2020Updated 5 years ago
- Atari gauntlet for RL agents☆29Mar 18, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a python script to generate nice bibtex file for latex.☆19Mar 1, 2020Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- A curated list of awesome deep causal learning methods since 2018☆18Jan 20, 2023Updated 3 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆11Jul 21, 2024Updated last year
- ☆34Aug 11, 2022Updated 3 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆14Apr 29, 2025Updated last year
- Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems☆21Nov 24, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- ☆13Mar 29, 2019Updated 7 years ago
- Contains an implementation of "Imitation Learning via Kernel Mean Embedding (2018, AAAI)"☆11Oct 2, 2018Updated 7 years ago
- Based on pytoch, gradcam and gradcam + + are encapsulated into easy-to-use API, and some interesting tests are done with pre trained vgg1…☆13Aug 29, 2020Updated 5 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Unsupervised muti-metric fusion for Full-Reference (FR) Image Quality Assessment (IQA)☆11Jul 11, 2014Updated 11 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆14Sep 23, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- Accelerating Transfer Learning with Robust Neural Nets☆11Oct 2, 2020Updated 5 years ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- ☆11Dec 16, 2018Updated 7 years ago
- Deep Boosting for Image Denoising (ECCV 2018)☆16Nov 3, 2018Updated 7 years ago
- IEEE TVCG Visual Analytics in Deep Learning Survey☆19Feb 11, 2021Updated 5 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- Comparison of gradient estimation techniques for black-box adversarial examples☆11Oct 31, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- DEF CON 31 AI Village - LLMs: Loose Lips Multipliers☆10Aug 16, 2023Updated 2 years ago
- ☆50Aug 30, 2024Updated last year
- Implementation of robust deep anomaly detection models using Partial Conditional Invariant Regularization (PCIR). Accepted to NeurIPS 202…☆14Oct 27, 2023Updated 2 years ago
- Keras implementation of: Fitted Learning: Models with Awareness of their Limits☆13Mar 23, 2017Updated 9 years ago
- ☆11Jun 4, 2024Updated last year
- Generates animated plots of different models of neural network classifiers during learning in order to compare them.☆10Jul 23, 2023Updated 2 years ago
- [NeurIPS 2022 Spotlight] Improving Generative Adversarial Networks via Adversarial Learning in Latent Space☆17Nov 20, 2022Updated 3 years ago