Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17
☆30Sep 15, 2018Updated 7 years ago
Alternatives and similar repositories for AIP
Users that are interested in AIP are comparing it to the libraries listed below
Sorting:
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18☆56Jun 7, 2019Updated 6 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- ☆12Jan 7, 2023Updated 3 years ago
- ☆21Jun 10, 2020Updated 5 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- [ICLR 2020] Code for paper "Robustness Verification for Transformers"☆27Nov 26, 2024Updated last year
- Reachability Analysis of Deep Neural Networks with Provable Guarantees☆36Feb 25, 2020Updated 6 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- Hybrid systems equations simulator, development repository☆14Oct 11, 2025Updated 4 months ago
- ☆10May 18, 2024Updated last year
- ☆10Jun 23, 2018Updated 7 years ago
- Implementation of NAACL'19 Strong and Simple Baselines for Multimodal Utterance Embeddings☆10Jun 4, 2019Updated 6 years ago
- Exploiting Saliency for Object Segmentation from Image Level Labels, CVPR'17☆37Sep 15, 2018Updated 7 years ago
- Web-based formula editor that creates strict content MathML☆11Feb 8, 2022Updated 4 years ago
- Python (Cython) binding for harfbuzz an OpenType text shaping.☆19Aug 24, 2018Updated 7 years ago
- Learning globally stable dynamical systems policies through imitation. A modification of the original work, focussing on waypoint-based i…☆12Oct 12, 2024Updated last year
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated last month
- resources, links for OCR & greek☆10Mar 8, 2021Updated 4 years ago
- ☆12Jun 11, 2025Updated 8 months ago
- The project consists of a image processing application that is using distributed processors (MPI). The development language is C/C++ with…☆13Mar 26, 2012Updated 13 years ago
- GLIA: Graph Learning Library for Image Analysis☆10May 26, 2017Updated 8 years ago
- DE1SoC VGA and Audio☆10Jan 11, 2017Updated 9 years ago
- Low-rank Highway Networks☆13Mar 11, 2016Updated 9 years ago
- Javascript tool for animation of linear physical systems☆16Aug 2, 2016Updated 9 years ago
- 🤖 Implementation of Self Normalizing Networks (SNN) in PyTorch.☆12Jun 19, 2017Updated 8 years ago
- Image search based on convolutional neural network feature extraction.☆14May 11, 2018Updated 7 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- Tesseract tessdata downloader from GitHub repositories☆11Sep 17, 2021Updated 4 years ago
- Colab notebooks for d2l-book☆11Dec 5, 2019Updated 6 years ago
- Source code of "Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers" EMNLP 2025☆16Jan 12, 2026Updated last month
- use yolov3 onnx model to implement object detection☆11Apr 25, 2019Updated 6 years ago
- ☆13Jan 25, 2019Updated 7 years ago
- ☆12Nov 19, 2024Updated last year
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- ☆18Aug 23, 2025Updated 6 months ago