jayaram-r / adversarial-detection
Code and experiments for the adversarial detection paper
☆20Updated 3 years ago
Alternatives and similar repositories for adversarial-detection:
Users that are interested in adversarial-detection are comparing it to the libraries listed below
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆24Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆46Updated 3 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆29Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Updated 2 years ago
- the paper "Geometry-aware Instance-reweighted Adversarial Training" ICLR 2021 oral☆59Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 2 years ago
- Code relative to "Adversarial robustness against multiple and single $l_p$-threat models via quick fine-tuning of robust classifiers"☆18Updated 2 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- ☆57Updated 2 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆25Updated 2 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆47Updated 3 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆33Updated 2 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- [ICLR 2022] Reliable Adversarial Distillation with Unreliable Teachers☆21Updated 3 years ago
- ConvexPolytopePosioning☆34Updated 5 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆26Updated 2 years ago
- Backdoor Safety Tuning (NeurIPS 2023 & 2024 Spotlight)☆25Updated 3 months ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- ☆21Updated 2 years ago
- ☆22Updated last year
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆12Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- SEAT☆20Updated last year
- ☆29Updated 2 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆26Updated last year
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆17Updated 7 months ago