This repository contains the code for Characterizing the Decision Boundary of Deep Neural Networks
☆25Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for DeepDIG
Users that are interested in DeepDIG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Implementation of "Adversarial Frontier Stitching for Remote Neural Network Watermarking" in TensorFlow.☆24Aug 30, 2021Updated 4 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- On the decision boundary of deep neural networks☆38Aug 23, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for "DeepPolar codes", ICML 2024☆12May 7, 2024Updated last year
- Spread OFDM-IM, signal detection shemes, theoretical bound on bit error probability☆12May 16, 2022Updated 3 years ago
- This is source code of our Master Thesis on "Decode and Forward Relay Assisting Active Jamming in NOMA system".☆12Feb 26, 2024Updated 2 years ago
- This is a pytorch implementation of digital semantic communication.☆25Dec 17, 2024Updated last year
- Matlab codes for Unsourced Multiple Access With Random User Activity by K.-H. Ngo, A. Lancho, G. Durisi, and A. Graell i Amat☆12May 26, 2023Updated 2 years ago
- The official implementation of the paper "Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks".☆19Apr 19, 2024Updated 2 years ago
- ☆13Mar 29, 2022Updated 4 years ago
- ☆17Aug 2, 2024Updated last year
- Source code of the paper titled "Digital Semantic Communications: An Alternating Multi-Phase Training Strategy with Mask Attack"☆15Oct 5, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implemention of "Piracy Resistant Watermarks for Deep Neural Networks" in TensorFlow.☆12Dec 5, 2020Updated 5 years ago
- Matlab and Python implementation of Different Information Theoretical Bounds: Shannon limit, Sphere Packaging Bound, Polyanskiy bound, …☆15Apr 28, 2023Updated 3 years ago
- Official PyTorch code for CVPR 2021 paper "AutoDO: Robust AutoAugment for Biased Data with Label Noise via Scalable Probabilistic Implici…☆24Oct 26, 2022Updated 3 years ago
- ☆16Dec 3, 2021Updated 4 years ago
- ☆16Jul 17, 2022Updated 3 years ago
- Compression-based decentralized stochastic gradient descent (DSGD) algorithms tailored for digital and analog wireless implementations☆13Jun 26, 2022Updated 3 years ago
- Source codes for "Trainable Joint Channel Estimation, Detection and Decoding for MIMO URLLC Systems"☆14Nov 27, 2023Updated 2 years ago
- Latent Diffusion Model-Enabled Low-Latency Semantic Communication in the Presence of Semantic Ambiguities and Wireless Channel Noises☆18Nov 19, 2024Updated last year
- ☆24Jan 3, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation for our ICC 2025 paper AdaFortiTran: An Adaptive Transformer Model for Robust OFDM Channel Estimation☆19Mar 24, 2026Updated last month
- This is a pytorch implementation of diffusion models-based image transmission systems.☆17Nov 9, 2024Updated last year
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- Implementation of the Paper "Channel Estimation for Quantized Systems based on Conditionally Gaussian Latent Models".☆14Mar 5, 2024Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆17Jun 3, 2024Updated last year
- Implementation code for the IEEE TSP paper "State-Augmented Learnable Algorithms for Resource Management in Wireless Networks."☆13Jan 3, 2023Updated 3 years ago
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- Inspired by recent advances in coverage-guided analysis of neural networks, we propose a novel anomaly detection method. We show that the…☆13May 26, 2022Updated 3 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is for the papers I review every week☆14May 20, 2020Updated 5 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆24May 10, 2019Updated 6 years ago
- ☆18Feb 7, 2025Updated last year
- ☆10Mar 21, 2024Updated 2 years ago
- Understanding Rare Spurious Correlations in Neural Network☆12Jun 5, 2022Updated 3 years ago
- Implementation of the paper "Model Free Training of End-to-End Communication Systems"☆16Aug 6, 2022Updated 3 years ago
- ☆18Nov 13, 2021Updated 4 years ago