chawins / knn-defenseView external linksLinks
Adversarial Examples on KNN (and its neural network friends)
☆20Mar 19, 2020Updated 5 years ago
Alternatives and similar repositories for knn-defense
Users that are interested in knn-defense are comparing it to the libraries listed below
Sorting:
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Nov 21, 2022Updated 3 years ago
- ☆20Mar 19, 2023Updated 2 years ago
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆23Sep 16, 2023Updated 2 years ago
- ☆32Jul 6, 2023Updated 2 years ago
- Framework for Adversarial Malware Evaluation.☆35Mar 31, 2025Updated 10 months ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- ☆10Updated this week
- ☆12Jul 25, 2018Updated 7 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆137Nov 25, 2020Updated 5 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Oct 15, 2020Updated 5 years ago
- Single-Life Reinforcement Learning☆14Dec 17, 2022Updated 3 years ago
- ☆10Apr 26, 2020Updated 5 years ago
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 3 years ago
- Smoothed Quadratic Energies on Meshes - Martinez Esturo et. al - ACM TOG 2014 - Reference Implementation☆10Mar 2, 2018Updated 7 years ago
- ☆13Oct 11, 2024Updated last year
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated last year
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago
- Computational time vs quality comparison between some Edge preserving smoothing filters☆10May 5, 2017Updated 8 years ago
- EAST: An Efficient and Accurate Scene Text Detector☆15Jan 22, 2018Updated 8 years ago
- Open-source repository for the ISSTA'23 paper "CONCORD: Clone-aware Contrastive Learning for Source Code"☆11Nov 10, 2023Updated 2 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models☆12Aug 17, 2021Updated 4 years ago
- Code Releasement for 'Generative Object Insertion in Gaussian Splatting with a Multi-View Diffusion Model'☆15Apr 26, 2025Updated 9 months ago
- ☆14Jul 5, 2022Updated 3 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- 流畅的python笔记☆11Dec 15, 2017Updated 8 years ago
- Code for "Learning Perceptually-Aligned Representations via Adversarial Robustness"☆164Mar 19, 2020Updated 5 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Jan 18, 2022Updated 4 years ago
- ☆48Mar 31, 2020Updated 5 years ago
- Exercises for practicing MLSec for Systems Security☆10Sep 2, 2024Updated last year
- ☆14Jun 25, 2022Updated 3 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- A simple script to generate texture atlases.☆25Mar 10, 2012Updated 13 years ago