☆20Feb 17, 2020Updated 6 years ago
Alternatives and similar repositories for DeepConfuse
Users that are interested in DeepConfuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10Jul 28, 2022Updated 3 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- Improved DP-SGD for optimizing☆20Mar 23, 2019Updated 7 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- ☆18Nov 13, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆54Sep 11, 2021Updated 4 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Jul 29, 2021Updated 4 years ago
- This is the official clone for the implementation of the NIPS18 paper Multi-Layered Gradient Boosting Decision Trees (mGBDT) .☆105Nov 19, 2018Updated 7 years ago
- ☆69Feb 17, 2024Updated 2 years ago
- [ICLR 2025] Image watermarks are removable using controllable regeneration from clean noise☆28Feb 17, 2025Updated last year
- Implementation of paper 'Reversing the Forget-Retain Objectives: An Efficient LLM Unlearning Framework from Logit Difference' [NeurIPS'24…☆26Jun 14, 2024Updated last year
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- The PackNet Continual Learning Method in Pytorch☆15Aug 19, 2021Updated 4 years ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Code for the WWW21 paper "Not All Features Are Equal: Discovering Essential Features for Preserving Prediction Privacy"☆12Feb 15, 2021Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- Official repo for [CVPR2025 Oral] Black-Box Forgery Attacks on Semantic Watermarks for Diffusion Models☆38Nov 19, 2025Updated 6 months ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 7 months ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Nov 5, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- Code for Auditing DPSGD☆39Feb 15, 2022Updated 4 years ago
- Suri: Multi-constraint instruction following for long-form text generation (EMNLP’24)☆27Oct 3, 2025Updated 7 months ago
- Backdoor Stuff in AI/ ML domain☆36May 15, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Convert pdf to pages of images☆13Apr 18, 2020Updated 6 years ago
- ☆17Apr 22, 2026Updated last month
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Code for "Purify Unlearnable Examples via Rate-Constrained Variational Autoencoders" at ICML 2024☆11Sep 18, 2025Updated 8 months ago
- Webank AI☆41Feb 19, 2025Updated last year
- [Findings of ACL 2023] Communication Efficient Federated Learning for Multilingual Machine Translation with Adapter☆12Sep 4, 2023Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- [ECCV24] "Challenging Forgets: Unveiling the Worst-Case Forget Sets in Machine Unlearning" by Chongyu Fan*, Jiancheng Liu*, Alfred Hero, …☆26May 27, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- ☆33Nov 27, 2023Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- [Under Progress] Code & Data for the AAAI 2020 Paper "Likelihood Ratios and Generative Classifiers For Unsupervised OOD Detection In Task…☆10Jul 25, 2024Updated last year
- ☆13Mar 14, 2022Updated 4 years ago
- ☆12Sep 16, 2024Updated last year