Adversarial Examples on KNN (and its neural network friends)
☆19Mar 19, 2020Updated 6 years ago
Alternatives and similar repositories for knn-defense
Users that are interested in knn-defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PyTorch Implementation of the Deep k-Nearest-Neighbors algorithm, https://arxiv.org/abs/1803.04765☆16Aug 18, 2020Updated 5 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Nov 21, 2022Updated 3 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆19Mar 19, 2023Updated 3 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- ☆11Jul 2, 2025Updated 10 months ago
- Framework for Adversarial Malware Evaluation.☆36Mar 31, 2025Updated last year
- Single-Life Reinforcement Learning☆14Dec 17, 2022Updated 3 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- ☆14Jun 25, 2022Updated 3 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- the instructions about request access to AdvDroidZero☆13Apr 10, 2024Updated 2 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆45Jan 18, 2022Updated 4 years ago
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 4 years ago
- Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware☆53Jul 4, 2019Updated 6 years ago
- Official implementation for the AAAI2025 paper "PIXELS - Progressive Image Xemplar-based Editing with Latent Surgery"☆11Dec 17, 2024Updated last year
- ☆11Oct 15, 2020Updated 5 years ago
- ☆13Feb 5, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- ☆10Apr 6, 2018Updated 8 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Policy Transfer across Visual and Dynamics Domain Gaps via Iterative Grounding (RSS 2021)☆12Oct 22, 2021Updated 4 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- Code for "Preference Tuning For Toxicity Mitigation Generalizes Across Languages." Paper accepted at Findings of EMNLP 2024☆18Mar 25, 2025Updated last year
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- ☆14Mar 23, 2023Updated 3 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated 2 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Oct 15, 2020Updated 5 years ago
- This repository accompanies the following paper: A Workflow for Offline Model-Free Robotic RL☆13Nov 5, 2021Updated 4 years ago