This repository contains the code for Characterizing the Decision Boundary of Deep Neural Networks
☆25Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for DeepDIG
Users that are interested in DeepDIG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- [EMNLP 2022] Distillation-Resistant Watermarking (DRW) for Model Protection in NLP☆13Aug 17, 2023Updated 2 years ago
- Code for "DeepPolar codes", ICML 2024☆12May 7, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is source code of our Master Thesis on "Decode and Forward Relay Assisting Active Jamming in NOMA system".☆12Feb 26, 2024Updated 2 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- Deep learning-aided muticarrier systems (MC-AE)☆10Dec 8, 2020Updated 5 years ago
- Matlab codes for Unsourced Multiple Access With Random User Activity by K.-H. Ngo, A. Lancho, G. Durisi, and A. Graell i Amat☆12May 26, 2023Updated 2 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated last year
- Source code of the paper titled "Digital Semantic Communications: An Alternating Multi-Phase Training Strategy with Mask Attack"☆14Oct 5, 2025Updated 6 months ago
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Matlab and Python implementation of Different Information Theoretical Bounds: Shannon limit, Sphere Packaging Bound, Polyanskiy bound, …☆15Apr 28, 2023Updated 2 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆16Jul 17, 2022Updated 3 years ago
- Official project page for Estimating the Rate-Distortion Function by Wasserstein Gradient Descent☆19Nov 2, 2023Updated 2 years ago
- Compression-based decentralized stochastic gradient descent (DSGD) algorithms tailored for digital and analog wireless implementations☆13Jun 26, 2022Updated 3 years ago
- Source codes for "Trainable Joint Channel Estimation, Detection and Decoding for MIMO URLLC Systems"☆14Nov 27, 2023Updated 2 years ago
- Latent Diffusion Model-Enabled Low-Latency Semantic Communication in the Presence of Semantic Ambiguities and Wireless Channel Noises☆18Nov 19, 2024Updated last year
- Implementation for our ICC 2025 paper AdaFortiTran: An Adaptive Transformer Model for Robust OFDM Channel Estimation☆18Mar 24, 2026Updated 2 weeks ago
- Ref: S. Mosleh, L. Liu, C. Sahin, Y. R. Zheng and Y. Yi, "Brain-Inspired Wireless Communications: Where Reservoir Computing Meets MIMO-OF…☆14Nov 29, 2020Updated 5 years ago
- This is a pytorch implementation of diffusion models-based image transmission systems.☆17Nov 9, 2024Updated last year
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Implementation of the Paper "Channel Estimation for Quantized Systems based on Conditionally Gaussian Latent Models".☆14Mar 5, 2024Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year
- ☆18Nov 29, 2023Updated 2 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆24May 10, 2019Updated 6 years ago
- ☆18Feb 7, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆10Mar 21, 2024Updated 2 years ago
- Understanding Rare Spurious Correlations in Neural Network☆12Jun 5, 2022Updated 3 years ago
- Implementation of the paper "Model Free Training of End-to-End Communication Systems"☆16Aug 6, 2022Updated 3 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- ☆15Jan 22, 2024Updated 2 years ago
- This repository contains the code for implementing the algorithms in the paper "Semantics-Guided Diffusion for Deep Joint Source-Channel …☆38Apr 1, 2025Updated last year
- Non Binary-LDPC sum-product decoder (flooding and layered) using FFT (QSPA-FFT)☆17Jun 25, 2025Updated 9 months ago