Code for the Adversarial Image Detectors and a Saliency Map
☆12Mar 23, 2017Updated 8 years ago
Alternatives and similar repositories for fooling
Users that are interested in fooling are comparing it to the libraries listed below
Sorting:
- ☆11Mar 24, 2023Updated 2 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- Sequenced Show, Attend, and Tell: Natural Language from Natural Images☆12Jun 15, 2016Updated 9 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Jun 29, 2020Updated 5 years ago
- Code for paper by Bamler & Mandt, "Extreme Classification via Adversarial Softmax Approximation" (ICLR 2020)☆14Apr 8, 2020Updated 5 years ago
- ☆22Jul 28, 2020Updated 5 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆18Nov 10, 2020Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆69Mar 19, 2018Updated 7 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- Code and experiments for the adversarial detection paper☆21Jun 11, 2021Updated 4 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆22Mar 20, 2022Updated 3 years ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆20May 21, 2019Updated 6 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆24May 10, 2019Updated 6 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- Official repo for the paper "Make Some Noise: Reliable and Efficient Single-Step Adversarial Training" (https://arxiv.org/abs/2202.01181)☆25Oct 17, 2022Updated 3 years ago
- Related materials for robust and explainable machine learning☆48Jan 29, 2018Updated 8 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆24Mar 26, 2019Updated 6 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Dec 4, 2022Updated 3 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 9 months ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Jun 27, 2022Updated 3 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- ☆26Jul 18, 2019Updated 6 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- A python implementation of the kernel two-samples test as in Gretton et al 2012 (JMLR).☆33Apr 21, 2016Updated 9 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- Code for "BayesAdapter: Being Bayesian, Inexpensively and Robustly, via Bayeisan Fine-tuning"☆32Jul 25, 2024Updated last year