Code and experiments for the adversarial detection paper
☆21Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for adversarial-detection
Users that are interested in adversarial-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆38Nov 22, 2022Updated 3 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆17Nov 10, 2020Updated 5 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆35Apr 1, 2020Updated 6 years ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- A Simple and Effective Solution For AISafety CVPR2022, ranked 5th☆12Aug 26, 2023Updated 2 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 8 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- Code for "Preference Tuning For Toxicity Mitigation Generalizes Across Languages." Paper accepted at Findings of EMNLP 2024☆18Mar 25, 2025Updated last year
- Active and Sample-Efficient Model Evaluation☆27May 22, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Denoising autoencoders for speaker identification on MCE 2018 challenge☆12Nov 8, 2018Updated 7 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- ☆64Aug 9, 2023Updated 2 years ago
- Code for Augment & Reduce, a scalable stochastic algorithm for large categorical distributions☆10May 16, 2018Updated 7 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆14Mar 23, 2023Updated 3 years ago
- AI voicebox on Raspberry Pi☆13Jan 27, 2026Updated 3 months ago
- ☆12Mar 24, 2023Updated 3 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆53Jan 7, 2022Updated 4 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- Code for the papers: "Stop Throwing Away Discriminators! Re-using Adversaries for Test-Time Training", Valvano et al., DART 2021; and "Re…☆10Jan 20, 2022Updated 4 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated last year
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [CVPRW'22] A privacy attack that exploits Adversarial Training models to compromise the privacy of Federated Learning systems.☆12Jul 7, 2022Updated 3 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆19Feb 18, 2024Updated 2 years ago
- A browser extension that exports conversations from Google AI Studio, including all media attachments and chat history in a convenient ZI…☆31Mar 31, 2026Updated last month
- A library for multi-task learning and meta-learning.☆12Feb 7, 2022Updated 4 years ago