coallaoh / WhitenBlackBox
Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18
☆55Updated 5 years ago
Alternatives and similar repositories for WhitenBlackBox:
Users that are interested in WhitenBlackBox are comparing it to the libraries listed below
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 5 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆86Updated 7 years ago
- Code for Stability Training with Noise (STN)☆21Updated 4 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Updated 5 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- AAAI 2019 oral presentation☆50Updated last week
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆40Updated 4 years ago
- A community-run reference for state-of-the-art adversarial example defenses.☆50Updated 6 months ago
- Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.☆62Updated 5 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- ☆12Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- ☆123Updated 3 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 6 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆123Updated 4 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆109Updated 7 years ago
- ☆31Updated 7 months ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Updated 5 years ago