carlini / breaking_defensive_distillationView external linksLinks
☆29Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for breaking_defensive_distillation
Users that are interested in breaking_defensive_distillation are comparing it to the libraries listed below
Sorting:
- Robust evasion attacks against neural network to find adversarial examples☆857Jun 1, 2021Updated 4 years ago
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- IPython notebook with synthetic experiments for AFLite, based on the ICML 2020 paper, "Adversarial Filters of Dataset Biases".☆16Aug 14, 2020Updated 5 years ago
- Library and experiments for attacking machine learning in discrete domains☆47Dec 8, 2022Updated 3 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆42Apr 24, 2019Updated 6 years ago
- Code for the paper "(De)Randomized Smoothing for Certifiable Defense against Patch Attacks" by Alexander Levine and Soheil Feizi.☆17Aug 22, 2022Updated 3 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Notes for the Deep Learning Book☆20Mar 27, 2019Updated 6 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Feb 10, 2023Updated 3 years ago
- Resnets in tensorflow 2.0.☆17Mar 15, 2025Updated 11 months ago
- to add☆20Nov 21, 2019Updated 6 years ago
- Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)☆27Jun 25, 2023Updated 2 years ago
- Code for Machine Learning Models that Remember Too Much (in CCS 2017)☆31Oct 15, 2017Updated 8 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- This repository contains the source code for "Membership Inference Attacks as Privacy Tools: Reliability, Disparity and Ensemble", In Pro…☆10Jan 2, 2026Updated last month
- Bloomberg module for the Perl Finance::Quote module (used in particular by GnuCash)☆13Jun 2, 2021Updated 4 years ago
- A proof-of-stake based crypto currency☆13Mar 6, 2024Updated last year
- LeapMotion controller for Philips Hue light system - use your hands to control the color & brightness☆10Aug 8, 2015Updated 10 years ago
- Simple, beautiful discussion forums - for customer support, news aggregation, QA sites, and online communities.☆56Dec 9, 2012Updated 13 years ago
- Python Reader for the Ultrasound File Format☆13Aug 7, 2023Updated 2 years ago
- Pytorch Adversarial Attack Framework☆78Apr 27, 2019Updated 6 years ago
- ☆34Aug 30, 2021Updated 4 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- ☆67Jul 30, 2019Updated 6 years ago
- ☆15Updated this week
- gpm is a tool for managing Go projects.☆11May 18, 2019Updated 6 years ago
- ☆17Feb 6, 2024Updated 2 years ago
- A bot that help you easily request money from friends.☆10Dec 6, 2016Updated 9 years ago
- On a dynamic IP address? Find out when it changes.☆12Sep 30, 2025Updated 4 months ago
- This is an inventory management system for a factory that manufactures plastic products☆11Mar 22, 2019Updated 6 years ago
- Official repository for 'Risk of Bias in Chest Radiography Deep Learning Foundation Models'☆12Sep 27, 2023Updated 2 years ago
- Machine Learning for the ASX200☆10Apr 12, 2017Updated 8 years ago
- CEX.IO API integration. PHP sources.☆21Oct 16, 2017Updated 8 years ago
- Code for Auditing DPSGD☆37Feb 15, 2022Updated 4 years ago
- Roll model for trading strategy to C++ or FPGA via Matlab tool☆10Sep 11, 2014Updated 11 years ago
- ☆13Jan 1, 2018Updated 8 years ago