ftramer / ad-versarial
☆44Updated 2 years ago
Alternatives and similar repositories for ad-versarial:
Users that are interested in ad-versarial are comparing it to the libraries listed below
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 7 years ago
- ☆23Updated 2 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆40Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Craft poisoned data using MetaPoison☆50Updated 3 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- AAAI 2019 oral presentation☆50Updated 8 months ago
- code for model-targeted poisoning☆12Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆11Updated 5 years ago
- ☆84Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆12Updated 4 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆85Updated 7 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Updated 3 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 4 years ago
- ☆25Updated 6 years ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆57Updated 5 years ago
- ConvexPolytopePosioning☆35Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- [NeurIPS 2022] "Randomized Channel Shuffling: Minimal-Overhead Backdoor Attack Detection without Clean Datasets" by Ruisi Cai*, Zhenyu Zh…☆20Updated 2 years ago
- ☆40Updated last year
- ☆47Updated 4 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆72Updated 9 months ago
- Breaking Certifiable Defenses☆17Updated 2 years ago
- A general method for training cost-sensitive robust classifier☆22Updated 5 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- Defending Against Backdoor Attacks Using Robust Covariance Estimation☆21Updated 3 years ago