kohpangwei / data-poisoning-releaseView external linksLinks
☆33Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for data-poisoning-release
Users that are interested in data-poisoning-release are comparing it to the libraries listed below
Sorting:
- Scalable Log Determinants for Gaussian Process Kernel Learning (https://arxiv.org/abs/1711.03481) (NIPS 2017)☆18Nov 10, 2017Updated 8 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Mar 20, 2019Updated 6 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs☆12Jun 19, 2015Updated 10 years ago
- Software relating to relational empirical risk minimization☆17Jun 12, 2021Updated 4 years ago
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Nov 22, 2019Updated 6 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆55Mar 24, 2021Updated 4 years ago
- Implementation of iterative inference in deep latent variable models☆43Aug 21, 2019Updated 6 years ago
- A general method for training cost-sensitive robust classifier☆22May 29, 2019Updated 6 years ago
- References for Papers at the Intersection of Causality and Fairness☆18Dec 3, 2018Updated 7 years ago
- machine reading comprehension with deep learning☆19Feb 6, 2018Updated 8 years ago
- Contextual Bandits Action Elimination DQN☆21Jun 25, 2018Updated 7 years ago
- ☆46Feb 23, 2018Updated 7 years ago
- Machine translation using deep learning with lstm,cnn,attention,beam search and so on.☆20Dec 26, 2017Updated 8 years ago
- deep learning specialization by andrew ng though deeplearning.ai on coursera☆23Apr 12, 2018Updated 7 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- A unified benchmark problem for data poisoning attacks☆161Oct 4, 2023Updated 2 years ago
- an unbias-learning-to-rank dataset of Baidu☆66Aug 3, 2024Updated last year
- Fine-grained ImageNet annotations☆30May 25, 2020Updated 5 years ago
- Code for NIPS 2015 "Gradient-Free Hamiltonian Monte Carlo via Effecient Kernel Exponential Families"☆26Jun 7, 2018Updated 7 years ago
- Lagrangian VAE☆28Jul 27, 2018Updated 7 years ago
- Code for ICLR 2022 Paper, "Controlling Directions Orthogonal to a Classifier"☆35Jun 6, 2023Updated 2 years ago
- Pytorch Implementation of paper "Noisy Natural Gradient as Variational Inference"☆121Sep 1, 2018Updated 7 years ago
- Code for "Towards a learning theory of cause-effect inference" (ICML 2015).☆30Aug 31, 2020Updated 5 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- Approximately balanced estimation of average treatment effects in high dimensions.☆35Jul 29, 2021Updated 4 years ago
- [ICML 2019] A Robust Meta-Algorithm for Stochastic Optimization☆30Aug 24, 2020Updated 5 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- ☆10Updated this week
- ☆67Jul 30, 2019Updated 6 years ago
- Understanding Short-Horizon Bias in Stochastic Meta-Optimization☆37Mar 8, 2018Updated 7 years ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆228Nov 9, 2019Updated 6 years ago
- Active Learning with Partial Feedback, ICLR 2019☆11Apr 27, 2020Updated 5 years ago
- ☆11Jun 15, 2019Updated 6 years ago
- 信號與系統實習☆12Nov 9, 2025Updated 3 months ago
- ☆10Mar 5, 2024Updated last year