Code corresponding to the paper "Adversarial Examples are not Easily Detected..."
☆88Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for nn_breaking_detection
Users that are interested in nn_breaking_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust evasion attacks against neural network to find adversarial examples☆861Jun 1, 2021Updated 4 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆113Feb 14, 2018Updated 8 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago
- ☆22Jul 28, 2020Updated 5 years ago
- A method for training neural networks that are provably robust to adversarial attacks.☆392Feb 16, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆66Jun 9, 2018Updated 7 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆122Nov 4, 2020Updated 5 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- A python implementation of the kernel two-samples test as in Gretton et al 2012 (JMLR).☆33Apr 21, 2016Updated 10 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- ☆27May 27, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,959Dec 3, 2025Updated 5 months ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- Contest Proposal and infrastructure for the Unrestricted Adversarial Examples Challenge☆334Sep 17, 2020Updated 5 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆763May 3, 2022Updated 4 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- [ICML'20] Multi Steepest Descent (MSD) for robustness against the union of multiple perturbation models.☆25Jul 25, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆53Jan 7, 2022Updated 4 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- A GAN demo project☆13Jan 2, 2020Updated 6 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,430Apr 10, 2024Updated 2 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆33Jun 7, 2022Updated 3 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago