A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`
☆16Feb 5, 2021Updated 5 years ago
Alternatives and similar repositories for MagNet.pytorch
Users that are interested in MagNet.pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Defense GAN in pytorch☆13May 12, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Aug 25, 2020Updated 5 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Mar 14, 2022Updated 4 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- ☆11Sep 15, 2021Updated 4 years ago
- The code for our NeurIPS 2021 paper "Kernelized Heterogeneous Risk Minimization".☆13Oct 13, 2021Updated 4 years ago
- Mamba4Cast, a zero-shot time series forecasting model, achieves competitive performance and faster inference than transformer-based model…☆47Oct 11, 2024Updated last year
- ☆16Updated this week
- 太极图形演示☆12Feb 23, 2022Updated 4 years ago
- MPNG☆11Sep 13, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Demand Response Analysis Framework (DRAF)☆24Aug 26, 2024Updated last year
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Modeling and Investigating the LLM electricity demand's impacts on Power and Energy Systems☆26Aug 19, 2025Updated 7 months ago
- Ark Beat is a rhythm game written in masm.☆13Jun 16, 2021Updated 4 years ago
- ☆23Aug 24, 2020Updated 5 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 4 months ago
- [ECCV2020] Motion-excited Sampler: Video Adversarial Attack with Sparked Prior☆11Nov 7, 2020Updated 5 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple PyTorch implementations of `Badnets: Identifying vulnerabilities in the machine learning model supply chain` on MNIST and CIFAR1…☆10May 19, 2021Updated 4 years ago
- A project aimed to classify dog breeds and search for the most matched image in the database☆10Jan 17, 2019Updated 7 years ago
- Image classification using pytorch on German Traffic Sign data set☆10Jan 10, 2021Updated 5 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Jan 18, 2022Updated 4 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Code for the paper "Refining Language Model with Compositional Explanation" (NeurIPS 2021)☆11Oct 25, 2021Updated 4 years ago
- ICML 2024 Paper "Adversarial Robustness Limits via Scaling-Law and Human-Alignment Studies"☆17Jul 10, 2024Updated last year
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆12Oct 12, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Contains implementation of denoising algorithms.☆11Jul 16, 2020Updated 5 years ago
- 北航计算机网络个人学习笔记☆16Nov 10, 2020Updated 5 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- Codes for reproducing the robustness evaluation scores in “Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approac…☆52Sep 18, 2018Updated 7 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Physics informed, deep-learning-based state estimation for distribution electrical grids. The study proposes using physical properties of…☆28Mar 24, 2023Updated 3 years ago
- This repository contains the pytorch attempts to replicate the results from the recent DeepMind Paper, "On the Effectiveness of Interval …☆10May 27, 2019Updated 6 years ago