Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
☆19Nov 28, 2018Updated 7 years ago
Alternatives and similar repositories for translearn
Users that are interested in translearn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- ☆87Feb 6, 2021Updated 5 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ICML Workshop 18 - Auto-Classification of Retinal Diseases in the Limit of Sparse Data Using a Two-Streams Machine Learning Model☆17Jun 22, 2020Updated 5 years ago
- Membership Inference Attack against Graph Neural Networks☆12Nov 9, 2022Updated 3 years ago
- Atari gauntlet for RL agents☆29Mar 18, 2017Updated 9 years ago
- This is a python script to generate nice bibtex file for latex.☆18Mar 1, 2020Updated 6 years ago
- Code from the paper: Neurlux: Dynamic Malware Analysis Without Feature Engineering☆13Dec 27, 2020Updated 5 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆19Jan 13, 2021Updated 5 years ago
- ☆11Jul 21, 2024Updated last year
- ☆34Aug 11, 2022Updated 3 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- [ICML 2024] Sparse Model Inversion: Efficient Inversion of Vision Transformers with Less Hallucination☆14Apr 29, 2025Updated 10 months ago
- PyTorch implementation of Grad-CAM☆12Mar 20, 2020Updated 6 years ago
- Code for paper: "Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures"☆21Jun 6, 2022Updated 3 years ago
- Code for NDSS paper: Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems☆21Nov 24, 2018Updated 7 years ago
- ☆11Jul 27, 2018Updated 7 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- Contains an implementation of "Imitation Learning via Kernel Mean Embedding (2018, AAAI)"☆11Oct 2, 2018Updated 7 years ago
- Hierarchical Group Sparse Regularization for Deep Convolutional Neural Networks☆12Apr 13, 2020Updated 5 years ago
- [TOIS'24] "RecRanker: Instruction Tuning Large Language Model as Ranker for Top-k Recommendation"☆16Dec 1, 2024Updated last year
- Based on pytoch, gradcam and gradcam + + are encapsulated into easy-to-use API, and some interesting tests are done with pre trained vgg1…☆13Aug 29, 2020Updated 5 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Implementation of robust deep anomaly detection models using Partial Conditional Invariant Regularization (PCIR). Accepted to NeurIPS 202…☆13Oct 27, 2023Updated 2 years ago
- Code repository of NeurIPS 2021 paper: Detecting and Adapting to Irregular Distribution Shifts in Bayesian Online Learning.☆12Oct 17, 2022Updated 3 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Aug 24, 2022Updated 3 years ago
- ☆14Sep 23, 2014Updated 11 years ago
- 膨胀卷积,Multi Scale Context Aggregation by Dilated Convolutions的实现☆12Dec 24, 2017Updated 8 years ago
- ☆12Nov 10, 2020Updated 5 years ago
- code for rain streaks removal☆11Apr 18, 2018Updated 7 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks☆21Aug 15, 2022Updated 3 years ago
- Proof of Concept of a Federated Learning framework that maintains the privacy of the participants involved.☆14Feb 4, 2026Updated last month
- Accelerating Transfer Learning with Robust Neural Nets☆11Oct 2, 2020Updated 5 years ago
- ICL backdoor attack☆17Nov 4, 2024Updated last year
- ☆11Jun 6, 2022Updated 3 years ago
- ☆11Dec 16, 2018Updated 7 years ago