kohpangwei / data-poisoning-releaseLinks
☆32Updated 7 years ago
Alternatives and similar repositories for data-poisoning-release
Users that are interested in data-poisoning-release are comparing it to the libraries listed below
Sorting:
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆67Updated this week
- Randomized Smoothing of All Shapes and Sizes (ICML 2020).☆52Updated 4 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Updated 5 years ago
- Interpretation of Neural Network is Fragile☆36Updated last year
- Learning perturbation sets for robust machine learning☆65Updated 3 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 5 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Updated 6 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 6 years ago
- ☆88Updated 11 months ago
- ☆18Updated 5 years ago
- Interval attacks (adversarial ML)☆21Updated 6 years ago
- Differentially private release of semantic rich data☆35Updated 4 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- ☆26Updated 2 years ago
- ☆22Updated 6 years ago
- ☆50Updated 2 years ago
- ☆26Updated 7 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆41Updated 6 years ago
- Code and data for the experiments in "On Fairness and Calibration"☆51Updated 3 years ago
- ☆17Updated 4 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Updated 8 years ago
- Research prototype of deletion efficient k-means algorithms☆24Updated 5 years ago
- ☆29Updated 6 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Updated 6 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆62Updated 6 years ago
- Geometric Certifications of Neural Nets☆42Updated 2 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Updated 5 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆20Updated 3 years ago
- [ICML 2021] Information Obfuscation of Graph Neural Networks☆36Updated 4 years ago