Related materials for robust and explainable machine learning
☆48Jan 29, 2018Updated 8 years ago
Alternatives and similar repositories for Robust-and-Explainable-Machine-Learning
Users that are interested in Robust-and-Explainable-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Mar 2, 2022Updated 4 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- mmDCGMs for accurate classification and excellent class-conditional generation in semi-supervised learning☆11Jun 19, 2017Updated 8 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 4 years ago
- Code for the Paper 'On the Connection Between Adversarial Robustness and Saliency Map Interpretability' by C. Etmann, S. Lunz, P. Maass, …☆16May 9, 2019Updated 6 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Public code for a paper "Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks."☆35Dec 18, 2018Updated 7 years ago
- Code of "Max-margin Deep Generative Models" (NIPS15)☆18Sep 29, 2015Updated 10 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Code to replicate "Generating Visual Explanations"☆48Nov 1, 2020Updated 5 years ago
- Website for Security and Privacy of Machine Learning☆14Dec 27, 2021Updated 4 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 10 months ago
- Empirical tricks for training robust models (ICLR 2021)☆256May 25, 2023Updated 2 years ago
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- Sequenced Show, Attend, and Tell: Natural Language from Natural Images☆12Jun 15, 2016Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SimEc code relying on the theano library - check out the simec repo instead for keras based code!☆10Feb 28, 2018Updated 8 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- Designing efficient architectures for modeling temporal features with convolutional neural networks☆16Mar 17, 2017Updated 9 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Explore using "Conditional Neural Process" for clustering longitudinal data efficiently☆13Oct 7, 2018Updated 7 years ago
- Residual LSTM for sanskrit text generation☆19May 2, 2018Updated 7 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- Fused lasso for high-dimensional regression over groups☆10Jun 17, 2018Updated 7 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆112Feb 14, 2018Updated 8 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Interpreting neural networks via the STREAK algorithm (streaming weak submodular maximization)☆23Oct 20, 2017Updated 8 years ago
- Gradient based receptive field estimation for Convolutional Neural Networks☆14Nov 25, 2017Updated 8 years ago
- Training Low-bits DNNs with Stochastic Quantization☆74Aug 4, 2017Updated 8 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago