☆11Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for Certify_Topk
Users that are interested in Certify_Topk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Sep 26, 2019Updated 6 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- ☆19Mar 19, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Mar 5, 2018Updated 8 years ago
- ☆19Mar 24, 2023Updated 3 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Learning Certified Individually Fair Representations☆24Nov 7, 2020Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆27Feb 13, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆36Feb 23, 2024Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Code for Stability Training with Noise (STN)☆22Dec 27, 2020Updated 5 years ago
- Fork of cma-es library by Nikolaus Hansen☆12Jul 12, 2017Updated 8 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- White-box Fairness Testing through Adversarial Sampling☆14Apr 16, 2021Updated 5 years ago
- Mine conversations from novels in Project Gutenberg, to generate data for data-driven dialogue systems.☆15May 7, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 7 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Prolog specification of TensorFlow layers☆14Jun 12, 2023Updated 2 years ago
- An ARM decompiler converts ARM code to a ready to compile C code. Project was done as a 3rd Semester project.☆15Jun 15, 2022Updated 3 years ago
- Collection of advanced Siri Shortcuts☆15May 27, 2021Updated 4 years ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆30Nov 6, 2019Updated 6 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Apr 18, 2023Updated 3 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- ☆13Aug 17, 2017Updated 8 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Jan 9, 2023Updated 3 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago