ggsharma / GTSRB-torchLinks
Image classification using pytorch on German Traffic Sign data set
☆10Updated 4 years ago
Alternatives and similar repositories for GTSRB-torch
Users that are interested in GTSRB-torch are comparing it to the libraries listed below
Sorting:
- Implementation of the paper "An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models"☆17Updated 5 years ago
- ☆11Updated 3 years ago
- Personalized Federated Learning by Structured and Unstructured Pruning under Data Heterogeneity☆43Updated 4 years ago
- reproduce the FLTrust model based on the paper "FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping"☆32Updated 2 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Updated 5 years ago
- ☆15Updated last year
- ☆19Updated 4 years ago
- The official code of KDD22 paper "FLDetecotor: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clien…☆84Updated 2 years ago
- Github Repo for AAAI 2023 paper: On the Vulnerability of Backdoor Defenses for Federated Learning☆40Updated 2 years ago
- ☆17Updated last year
- paper code☆27Updated 5 years ago
- Federated Learning and Membership Inference Attacks experiments on CIFAR10☆23Updated 5 years ago
- PyTorch implementation of Kaggle GTSRB challenge with 99.8% accuracy☆57Updated 6 years ago
- Adversarial attacks and defenses against federated learning.☆20Updated 2 years ago
- Code for "ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking"☆13Updated 3 years ago
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Updated 3 years ago
- LISA Traffic Signs Dataset for Pytorch. For Classification. 32x32 images. I use this to reproduce the Activation Clustering Results.☆21Updated 4 years ago
- ☆54Updated 3 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆62Updated 2 years ago
- An implementation of FedPAQ using different experimental parameters. We will be looking at different variations of how, r(number of clien…☆23Updated 4 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆22Updated last year
- ☆24Updated 3 years ago
- Reproduce Paper "Federated Learning with Non-IID Data"☆10Updated 4 years ago
- Official implementation of "FL-WBC: Enhancing Robustness against Model Poisoning Attacks in Federated Learning from a Client Perspective"…☆43Updated 4 years ago
- ☆15Updated 9 months ago
- The code of the attack scheme in the paper "Backdoor Attack Against Split Neural Network-Based Vertical Federated Learning"☆21Updated 2 years ago
- [Usenix Security 2024] Official code implementation of "BackdoorIndicator: Leveraging OOD Data for Proactive Backdoor Detection in Federa…☆47Updated 2 months ago
- 联邦学习分布式训练MNist数据集☆62Updated 6 years ago
- PyTorch implementation of Security-Preserving Federated Learning via Byzantine-Sensitive Triplet Distance☆34Updated last year
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Updated 5 years ago