Related materials for robust and explainable machine learning
☆48Jan 29, 2018Updated 8 years ago
Alternatives and similar repositories for Robust-and-Explainable-Machine-Learning
Users that are interested in Robust-and-Explainable-Machine-Learning are comparing it to the libraries listed below
Sorting:
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Mar 2, 2022Updated 4 years ago
- mmDCGMs for accurate classification and excellent class-conditional generation in semi-supervised learning☆11Jun 19, 2017Updated 8 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- Residual LSTM for sanskrit text generation☆19May 2, 2018Updated 7 years ago
- Code for our paper "CliqueCNN: Deep Unsupervised Exemplar Learning" https://arxiv.org/abs/1608.08792☆22Nov 10, 2017Updated 8 years ago
- Interpreting neural networks via the STREAK algorithm (streaming weak submodular maximization)☆23Oct 20, 2017Updated 8 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- SimEc code relying on the theano library - check out the simec repo instead for keras based code!☆10Feb 28, 2018Updated 8 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Sequenced Show, Attend, and Tell: Natural Language from Natural Images☆12Jun 15, 2016Updated 9 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/161…☆10Nov 16, 2016Updated 9 years ago
- Fused lasso for high-dimensional regression over groups☆10Jun 17, 2018Updated 7 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Gradient based receptive field estimation for Convolutional Neural Networks☆14Nov 25, 2017Updated 8 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47May 14, 2021Updated 4 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Website for Security and Privacy of Machine Learning☆14Dec 27, 2021Updated 4 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- ☆79Jan 16, 2018Updated 8 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- Code for "BayesAdapter: Being Bayesian, Inexpensively and Robustly, via Bayeisan Fine-tuning"☆32Jul 25, 2024Updated last year
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- ☆14Feb 1, 2017Updated 9 years ago
- ☆14Apr 7, 2017Updated 8 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 9 months ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Jul 7, 2020Updated 5 years ago
- TensorFlow and Numpy implementation of sparsemax☆15Dec 22, 2019Updated 6 years ago
- Getting the known gender based on name of each image in the "Labeled Faces in the Wild" dataset.☆14Apr 18, 2016Updated 9 years ago
- ☆22Jul 28, 2020Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- ShaResNet: reducing residual network parameter number by sharing weights☆32Mar 6, 2017Updated 8 years ago
- Split-Brain Autoencoders: Unsupervised Learning by Cross-Channel Prediction. In CVPR, 2017.☆141Jun 25, 2018Updated 7 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61May 14, 2019Updated 6 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago