Adversarial Examples on KNN (and its neural network friends)
☆20Mar 19, 2020Updated 5 years ago
Alternatives and similar repositories for knn-defense
Users that are interested in knn-defense are comparing it to the libraries listed below
Sorting:
- PyTorch Implementation of the Deep k-Nearest-Neighbors algorithm, https://arxiv.org/abs/1803.04765☆16Aug 18, 2020Updated 5 years ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Nov 21, 2022Updated 3 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- ☆20Mar 19, 2023Updated 2 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Sep 6, 2021Updated 4 years ago
- Pytorch - Adversarial Training☆26May 9, 2018Updated 7 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆36Dec 18, 2024Updated last year
- ☆33Jul 6, 2023Updated 2 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- ☆10Feb 27, 2026Updated last week
- ☆36Aug 30, 2019Updated 6 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆153Oct 15, 2020Updated 5 years ago
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 3 years ago
- ☆10Apr 26, 2020Updated 5 years ago
- ☆10Apr 6, 2018Updated 7 years ago
- Smoothed Quadratic Energies on Meshes - Martinez Esturo et. al - ACM TOG 2014 - Reference Implementation☆10Mar 2, 2018Updated 8 years ago
- ☆13Oct 11, 2024Updated last year
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- ☆14Jul 5, 2022Updated 3 years ago
- Computational time vs quality comparison between some Edge preserving smoothing filters☆10May 5, 2017Updated 8 years ago
- Html5 Tile editor for 2D games☆11Feb 3, 2021Updated 5 years ago
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models☆12Aug 17, 2021Updated 4 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- I built a language translator algorithm using a Sequence to Sequence model Recurrent Neural Network.☆11Apr 21, 2017Updated 8 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- Code and materials for "Weird Generalization and Inductive Backdoors"☆36Jan 11, 2026Updated last month
- EAST: An Efficient and Accurate Scene Text Detector☆15Jan 22, 2018Updated 8 years ago
- Code Releasement for 'Generative Object Insertion in Gaussian Splatting with a Multi-View Diffusion Model'☆16Apr 26, 2025Updated 10 months ago
- Code for "Learning Perceptually-Aligned Representations via Adversarial Robustness"☆164Mar 19, 2020Updated 5 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- A vulnerability patch gathering tool☆44Jan 11, 2019Updated 7 years ago
- ☆13Jan 14, 2026Updated last month