coallaoh / WhitenBlackBoxView external linksLinks
Towards Reverse-Engineering Black-Box Neural Networks, ICLR'18
☆56Jun 7, 2019Updated 6 years ago
Alternatives and similar repositories for WhitenBlackBox
Users that are interested in WhitenBlackBox are comparing it to the libraries listed below
Sorting:
- The implementatin of our ICLR 2021 work: Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits☆18Jul 20, 2021Updated 4 years ago
- SGD with large step sizes learns sparse features [ICML 2023]☆33Apr 24, 2023Updated 2 years ago
- Source code of "Leaky Thoughts: Large Reasoning Models Are Not Private Thinkers" EMNLP 2025☆16Jan 12, 2026Updated last month
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Graph Datasets with Synthetic Noise Edges☆13May 12, 2020Updated 5 years ago
- Source code for paper Mroueh, Sercu, Rigotti, Padhi, dos Santos, "Sobolev Independence Criterion", NeurIPS 2019☆14Jun 17, 2024Updated last year
- ZOSVRG-BlackBox-Adv☆13Oct 30, 2018Updated 7 years ago
- Modular framework for property inference attacks on deep neural networks☆18Jun 8, 2023Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- ☆46Apr 18, 2019Updated 6 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆39Jan 28, 2019Updated 7 years ago
- Mathematical consequences of orthogonal weights initialization and regularization in deep learning. Experiments with gain-adjusted orthog…☆17Sep 21, 2019Updated 6 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- ☆19Mar 6, 2023Updated 2 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆31Jan 5, 2020Updated 6 years ago
- ☆29May 8, 2023Updated 2 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- Code for Fong and Vedaldi 2017, "Interpretable Explanations of Black Boxes by Meaningful Perturbation"☆32Sep 25, 2019Updated 6 years ago
- Learning perturbation sets for robust machine learning☆65Aug 23, 2021Updated 4 years ago
- Implementation of membership inference and model inversion attacks, extracting training data information from an ML model. Benchmarking …☆103Nov 2, 2019Updated 6 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- Spurious Features Everywhere - Large-Scale Detection of Harmful Spurious Features in ImageNet☆32Aug 22, 2023Updated 2 years ago
- ☆26Feb 15, 2023Updated 2 years ago
- ☆10Updated this week
- ☆28Dec 31, 2020Updated 5 years ago
- Channel for teaching Oceanographic Data Analysis and Modelling.☆19Jan 28, 2022Updated 4 years ago
- Reachability Analysis of Deep Neural Networks with Provable Guarantees☆36Feb 25, 2020Updated 5 years ago
- nrel5mw风力机组的参数与模型☆13Nov 30, 2023Updated 2 years ago
- ☆32Sep 2, 2024Updated last year
- Enabling reproducible Machine Learning research☆44Sep 17, 2025Updated 4 months ago
- Implementation of MetaVQA.☆12Jul 3, 2021Updated 4 years ago
- Fast, free, easy, and object-agnostic video anonymization☆11Dec 12, 2020Updated 5 years ago
- Building and compile all your CV documents in one easy and quickly!☆11Oct 19, 2017Updated 8 years ago
- ISMN quality control procedures☆13Jan 27, 2025Updated last year
- ContinualAI Jekyll website - NOW DEPRECATED☆28Apr 12, 2023Updated 2 years ago