☆11Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for Certify_Topk
Users that are interested in Certify_Topk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Sep 26, 2019Updated 6 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- ☆19Mar 19, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆19Mar 5, 2018Updated 8 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Learning Certified Individually Fair Representations☆24Nov 7, 2020Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- ☆27Nov 20, 2023Updated 2 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Code for Stability Training with Noise (STN)☆22Dec 27, 2020Updated 5 years ago
- Fork of cma-es library by Nikolaus Hansen☆12Jul 12, 2017Updated 8 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- template for https://cnli.me☆10Feb 27, 2025Updated last year
- White-box Fairness Testing through Adversarial Sampling☆14Apr 16, 2021Updated 4 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Prolog specification of TensorFlow layers☆14Jun 12, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- An ARM decompiler converts ARM code to a ready to compile C code. Project was done as a 3rd Semester project.☆15Jun 15, 2022Updated 3 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- ☆11Apr 18, 2023Updated 2 years ago
- ☆12Dec 9, 2020Updated 5 years ago
- ☆13Aug 17, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Jan 9, 2023Updated 3 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- ☆17Dec 13, 2019Updated 6 years ago