☆19Mar 19, 2023Updated 3 years ago
Alternatives and similar repositories for preprocessor-aware-black-box-attack
Users that are interested in preprocessor-aware-black-box-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Jul 24, 2022Updated 3 years ago
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆12Jun 20, 2023Updated 2 years ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- ☆23Apr 10, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Jan 2, 2020Updated 6 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- ☆20Feb 13, 2020Updated 6 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆54Feb 6, 2023Updated 3 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Dec 17, 2021Updated 4 years ago
- ☆65Jan 6, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Dec 9, 2022Updated 3 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- Code-Implementation-of-Super-Resolution-ZOO (image & video)☆10Jul 6, 2020Updated 5 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆35Dec 18, 2024Updated last year
- Implementation and evaluation of Almanac (Automaton/Logic Multi-Agent Natural Actor-Critic), an algorithm for multi-agent reinforcement l…☆10May 5, 2022Updated 3 years ago
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 8 years ago
- ☆13Feb 5, 2025Updated last year
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Official implementation of the FG23 paper: "Learning Continuous Mesh Representation with Spherical Implicit Surface"☆12Sep 12, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- Creative Instructions Project☆11Sep 4, 2023Updated 2 years ago
- ☆12Apr 25, 2025Updated 11 months ago
- ☆12Nov 16, 2020Updated 5 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- Mine conversations from novels in Project Gutenberg, to generate data for data-driven dialogue systems.☆15May 7, 2019Updated 6 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆17Aug 11, 2021Updated 4 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- This repository accompanies the following paper: A Workflow for Offline Model-Free Robotic RL☆12Nov 5, 2021Updated 4 years ago
- Metamath in C++☆14Jun 4, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- Collection of advanced Siri Shortcuts☆15May 27, 2021Updated 4 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago