data-avengers-girls / GHC19-Interpreting-ML-ModelsLinks
Coding exercises for workshop on Breaking the Black Box: Interpreting ML Models
☆10Updated 5 years ago
Alternatives and similar repositories for GHC19-Interpreting-ML-Models
Users that are interested in GHC19-Interpreting-ML-Models are comparing it to the libraries listed below
Sorting:
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- ☆20Updated last year
- A unified benchmark problem for data poisoning attacks☆157Updated last year
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 7 years ago
- ☆32Updated last year
- The Product Studio at Cornell Tech (TECH 5900).☆69Updated 6 years ago
- Provable adversarial robustness at ImageNet scale☆396Updated 6 years ago
- ☆66Updated 6 years ago
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Updated 5 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Updated 4 years ago
- ☆28Updated 8 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆125Updated 4 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 4 years ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆16Updated 10 months ago
- Code for Transferable Unlearnable Examples☆20Updated 2 years ago
- ☆157Updated 4 years ago
- Code for Auditing Data Provenance in Text-Generation Models (in KDD 2019)☆10Updated 6 years ago
- ☆53Updated 3 years ago
- Processed datasets that we have used in our research☆14Updated 5 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆33Updated 4 years ago
- Code for Auditing DPSGD☆37Updated 3 years ago
- ☆26Updated 3 months ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆170Updated last year
- ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation☆51Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆39Updated 4 years ago
- ☆10Updated 10 months ago