Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"
☆24May 10, 2019Updated 6 years ago
Alternatives and similar repositories for DeepBayes
Users that are interested in DeepBayes are comparing it to the libraries listed below
Sorting:
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆24Mar 26, 2019Updated 6 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- Pytorch implementation of "Hallucinating Agnostic Images to Generalize Across Domains"☆11Jul 10, 2019Updated 6 years ago
- ☆12Jul 8, 2023Updated 2 years ago
- Median cut color quantization☆10Oct 3, 2023Updated 2 years ago
- Sampling via Moment Sharing☆11Jul 29, 2015Updated 10 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- Code for the paper Adversarial Robustness via Adversarial Label-Smoothing☆11Feb 5, 2020Updated 6 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- ☆88Jul 25, 2024Updated last year
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- Repository for reproducing `Model-Based Robust Deep Learning`☆16Jan 22, 2021Updated 5 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago
- Cost-Effective Object Detection: Active Sample Mining with Switchable Selection Criteria☆12Dec 1, 2018Updated 7 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆61Jun 25, 2019Updated 6 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Implementations of the ICML 2017 paper (with Yarin Gal)☆38Dec 15, 2017Updated 8 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆22Mar 20, 2022Updated 3 years ago
- Implementation of Confidence-Calibrated Adversarial Training (CCAT).☆45Aug 3, 2020Updated 5 years ago
- Code for the paper "Pretraining task diversity and the emergence of non-Bayesian in-context learning for regression"☆25Jun 28, 2023Updated 2 years ago
- Code relative to "Adversarial robustness against multiple and single $l_p$-threat models via quick fine-tuning of robust classifiers"☆19Nov 30, 2022Updated 3 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Apr 8, 2018Updated 7 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- ☆30Jun 19, 2023Updated 2 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆43Feb 27, 2020Updated 6 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- [ICML'20] Multi Steepest Descent (MSD) for robustness against the union of multiple perturbation models.☆25Jul 25, 2024Updated last year
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- Code for T-MARS data filtering☆35Aug 23, 2023Updated 2 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- This repository contains the code for Characterizing the Decision Boundary of Deep Neural Networks☆25Sep 22, 2023Updated 2 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 3 years ago