Attacks using out-of-distribution adversarial examples
☆11Nov 19, 2019Updated 6 years ago
Alternatives and similar repositories for OOD-Attacks
Users that are interested in OOD-Attacks are comparing it to the libraries listed below
Sorting:
- verifying machine unlearning by backdooring☆20Mar 25, 2023Updated 2 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 5 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆31Apr 27, 2022Updated 3 years ago
- Code repository for the paper --- [USENIX Security 2023] Towards A Proactive ML Approach for Detecting Backdoor Poison Samples☆30Jul 11, 2023Updated 2 years ago
- Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17☆30Sep 15, 2018Updated 7 years ago
- ☆32Sep 2, 2024Updated last year
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 5 months ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- ☆10May 18, 2024Updated last year
- Research simulation toolkit for federated learning☆13Nov 7, 2020Updated 5 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆39Dec 3, 2024Updated last year
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated 2 months ago
- ☆11Apr 4, 2022Updated 3 years ago
- End-to-End Gradient Inversion (Gradient Leakage in Federated Learning) 【https://ieeexplore.ieee.org/document/9878027】☆11Aug 19, 2022Updated 3 years ago
- Federated principal component analysis (FPCA) is my master thesis, which aims to adapt PCA in a federated learning setting. The technique…☆11Apr 5, 2024Updated last year
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Dataset: UET Driver Activity Recognition☆10Apr 19, 2022Updated 3 years ago
- Machine learning project using federated learning for text generation☆11May 5, 2024Updated last year
- Seminar: intro to deep learning with tensorflow☆13Jun 27, 2017Updated 8 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- Official repo of the paper Deep Regression Unlearning accepted in ICML 2023☆14Jun 14, 2023Updated 2 years ago
- Simulation code for Federated Learning with Over-the-Air Computation.☆11Sep 11, 2020Updated 5 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- Unofficial Pytorch Implementation of "A Simple Framework for Contrastive Learning of Visual Representations"☆10Mar 11, 2020Updated 5 years ago
- A study in multi-center imaging diagnostics, emphasizing on the modality of cardiovascular magnetic resonance and the prediction of hyper…☆11Jul 14, 2021Updated 4 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- ☆11Apr 21, 2023Updated 2 years ago
- ☆18Aug 23, 2025Updated 6 months ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 5 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- Official implementation of NeurIPS'24 Spotlight paper "Monte Carlo Tree Search based Space Transfer for Black-box Optimization".☆12Nov 28, 2024Updated last year
- Code for the WWW'23 paper "Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy"☆12Feb 20, 2023Updated 3 years ago
- Speech recognition with federated learning☆11Jan 9, 2020Updated 6 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago