data-avengers-girls / GHC19-Interpreting-ML-ModelsLinks
Coding exercises for workshop on Breaking the Black Box: Interpreting ML Models
☆10Updated 6 years ago
Alternatives and similar repositories for GHC19-Interpreting-ML-Models
Users that are interested in GHC19-Interpreting-ML-Models are comparing it to the libraries listed below
Sorting:
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆98Updated 4 years ago
- ☆22Updated 6 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- Code for paper "Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality".☆125Updated 4 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Updated 2 years ago
- Invertible Concept-based Explanation (ICE)☆18Updated 4 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Updated 4 years ago
- ☆11Updated 3 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆756Updated 3 years ago
- A method for training neural networks that are provably robust to adversarial attacks.☆390Updated 3 years ago
- This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attac…☆31Updated 6 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆253Updated 5 years ago
- Take further steps in the arms race of adversarial examples with only preprocessing.☆37Updated 5 years ago
- Provable adversarial robustness at ImageNet scale☆401Updated 6 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆255Updated 4 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Updated 3 years ago
- ☆28Updated 8 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Updated 4 years ago
- reference implementation for "explanations can be manipulated and geometry is to blame"☆37Updated 3 years ago
- the paper "Geometry-aware Instance-reweighted Adversarial Training" ICLR 2021 oral☆59Updated 4 years ago
- ☆160Updated 4 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Updated 5 years ago
- A unified benchmark problem for data poisoning attacks☆159Updated 2 years ago
- Keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on popular da…☆19Updated last year
- Source code for "Neural Anisotropy Directions"☆16Updated 4 years ago
- Learning Adversarially Fair and Transferable Representations☆56Updated 7 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆170Updated last year
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Updated 2 years ago