This repository contains the code for Characterizing the Decision Boundary of Deep Neural Networks
☆25Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for DeepDIG
Users that are interested in DeepDIG are comparing it to the libraries listed below
Sorting:
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- On the decision boundary of deep neural networks☆38Aug 23, 2018Updated 7 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Code for "DeepPolar codes", ICML 2024☆12May 7, 2024Updated last year
- Spread OFDM-IM, signal detection shemes, theoretical bound on bit error probability☆12May 16, 2022Updated 3 years ago
- This is source code of our Master Thesis on "Decode and Forward Relay Assisting Active Jamming in NOMA system".☆12Feb 26, 2024Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Oct 10, 2022Updated 3 years ago
- Matlab codes for Unsourced Multiple Access With Random User Activity by K.-H. Ngo, A. Lancho, G. Durisi, and A. Graell i Amat☆12May 26, 2023Updated 2 years ago
- This is a pytorch implementation of digital semantic communication.☆21Dec 17, 2024Updated last year
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- ☆13Mar 29, 2022Updated 3 years ago
- ☆17Aug 2, 2024Updated last year
- Source code of the paper titled "Digital Semantic Communications: An Alternating Multi-Phase Training Strategy with Mask Attack"☆13Oct 5, 2025Updated 5 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Matlab and Python implementation of Different Information Theoretical Bounds: Shannon limit, Sphere Packaging Bound, Polyanskiy bound, …☆15Apr 28, 2023Updated 2 years ago
- Official PyTorch code for CVPR 2021 paper "AutoDO: Robust AutoAugment for Biased Data with Label Noise via Scalable Probabilistic Implici…☆24Oct 26, 2022Updated 3 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- Official project page for Estimating the Rate-Distortion Function by Wasserstein Gradient Descent☆19Nov 2, 2023Updated 2 years ago
- Compression-based decentralized stochastic gradient descent (DSGD) algorithms tailored for digital and analog wireless implementations☆13Jun 26, 2022Updated 3 years ago
- Latent Diffusion Model-Enabled Low-Latency Semantic Communication in the Presence of Semantic Ambiguities and Wireless Channel Noises☆18Nov 19, 2024Updated last year
- Ref: S. Mosleh, L. Liu, C. Sahin, Y. R. Zheng and Y. Yi, "Brain-Inspired Wireless Communications: Where Reservoir Computing Meets MIMO-OF…☆14Nov 29, 2020Updated 5 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- This is a pytorch implementation of diffusion models-based image transmission systems.☆17Nov 9, 2024Updated last year
- ☆15Jul 26, 2022Updated 3 years ago
- Implementation code for the IEEE TSP paper "State-Augmented Learnable Algorithms for Resource Management in Wireless Networks."☆13Jan 3, 2023Updated 3 years ago
- ☆18Nov 29, 2023Updated 2 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- 論文實現框架的code☆15Apr 28, 2023Updated 2 years ago
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆24May 10, 2019Updated 6 years ago
- ☆17Feb 7, 2025Updated last year
- ☆15Jan 22, 2024Updated 2 years ago
- This repository contains the code for implementing the algorithms in the paper "Semantics-Guided Diffusion for Deep Joint Source-Channel …☆38Apr 1, 2025Updated 11 months ago