kohpangwei / data-poisoning-release
☆32Updated 7 years ago
Alternatives and similar repositories for data-poisoning-release:
Users that are interested in data-poisoning-release are comparing it to the libraries listed below
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 4 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆51Updated 4 years ago
- Interpretation of Neural Network is Fragile☆36Updated 10 months ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Updated 5 years ago
- ☆17Updated 4 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆63Updated 5 years ago
- Randomized Smoothing of All Shapes and Sizes (ICML 2020).☆52Updated 4 years ago
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆67Updated 2 years ago
- ☆22Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- "Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers" (NeurIPS 2019, previously called "A Stratified Approach …☆17Updated 5 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 6 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆85Updated 7 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆32Updated 6 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Updated 7 years ago
- AAAI 2019 oral presentation☆50Updated 7 months ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆108Updated 7 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- Adversarial learning by utilizing model interpretation☆10Updated 6 years ago
- Code for Stability Training with Noise (STN)☆21Updated 4 years ago
- Differentially private release of semantic rich data☆35Updated 3 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆44Updated 5 years ago
- Explaining a black-box using Deep Variational Information Bottleneck Approach☆46Updated 2 years ago
- ☆28Updated 3 years ago
- ☆18Updated 5 years ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆38Updated 6 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Updated 5 years ago