jiaxiaojunQAQ / FGSM-LAW
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging (TIFS2024)
☆34Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for FGSM-LAW
- Improving fast adversarial training with prior-guided knowledge (TPAMI2024)☆35Updated 6 months ago
- Deep Learning - Robustness - Immune System☆25Updated 3 years ago
- [CCS'24] SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models☆105Updated 3 weeks ago
- [NDSS'24] Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time☆32Updated last month
- ☆41Updated 3 months ago
- A demo project to demonstrate how DES encryption/decryption works.☆18Updated 2 years ago
- This project help you understand the concepts of histogram equalization and histogram specification in image processing learning from a p…☆11Updated last year
- [ICLR 2023] Official Tensorflow implementation of "Distributionally Robust Post-hoc Classifiers under Prior Shifts"☆39Updated 8 months ago
- A comprehensive collection of resources focused on addressing and understanding hallucination phenomena in MLLMs.☆38Updated 6 months ago
- Code for ACL 2024 long paper: Are AI-Generated Text Detectors Robust to Adversarial Perturbations?☆28Updated 3 months ago
- ASK-Attack and ASK-Defense☆55Updated 2 years ago
- TITAN : A Task-oriented Dialogue Dataset with Mixed-Initiative Interactions☆45Updated last year
- [ICML22] "Revisiting and Advancing Fast Adversarial Training through the Lens of Bi-level Optimization" by Yihua Zhang*, Guanhua Zhang*, …☆73Updated 2 years ago
- ☆104Updated last week
- ☆42Updated last year
- ☆43Updated last month
- Image segmentation and classification framework, based on KERAS, features in controlling of large-scale experiments.☆23Updated last year
- An Information Flow Perspective for Exploring Large Vision Language Models on Reasoning Tasks☆58Updated 2 weeks ago
- [USENIX Security '24] Dataset associated with real-world malicious LLM applications, including 45 malicious prompts for generating malici…☆53Updated last month
- [NeurIPS 2024] EffiBench: Benchmarking the Efficiency of Automatically Generated Code☆56Updated last month
- A benchmark for logging statement generation.☆19Updated last week
- PyTorch Implementation of ECCV 2022 paper: "DuelGAN: A Duel Between Two Discriminators Stabilizes the GAN Training".☆48Updated 2 years ago
- ☆44Updated last year
- A simple handwriting network for handwritten digit string recognition with Pytorch.☆11Updated last year
- UNet series network architectures (UNet, R2UNet, Attention UNet, Nested UNet, Tiny UNet etc.), combined with joint training of YOLO and o…☆77Updated 10 months ago
- NLP自学仓库☆31Updated 4 months ago
- ☆15Updated last year
- Backend Service of the Flow Orchestration Platform: an open-source and powerful workflow orchestration platform that is simple, user-frie…☆28Updated last year
- ☆11Updated last month
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆18Updated last year