kohpangwei / data-poisoning-release
☆32Updated 7 years ago
Alternatives and similar repositories for data-poisoning-release:
Users that are interested in data-poisoning-release are comparing it to the libraries listed below
- ☆17Updated 4 years ago
- Interval attacks (adversarial ML)☆21Updated 5 years ago
- Craft poisoned data using MetaPoison☆49Updated 3 years ago
- ☆11Updated 5 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆63Updated 5 years ago
- ☆29Updated 5 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆32Updated 6 years ago
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆67Updated 2 years ago
- ☆26Updated last year
- ☆28Updated 3 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- "Tight Certificates of Adversarial Robustness for Randomly Smoothed Classifiers" (NeurIPS 2019, previously called "A Stratified Approach …☆17Updated 5 years ago
- Interpretation of Neural Network is Fragile☆36Updated 8 months ago
- Randomized Smoothing of All Shapes and Sizes (ICML 2020).☆52Updated 4 years ago
- An (imperfect) implementation of wide resnets and Parseval regularization☆9Updated 4 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆108Updated 6 years ago
- Adversarial learning by utilizing model interpretation☆10Updated 6 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Updated 4 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆51Updated 4 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 4 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Code for the CSF 2018 paper "Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting"☆38Updated 6 years ago
- ☆22Updated 5 years ago
- ☆18Updated 5 years ago
- ☆37Updated 4 years ago
- ☆26Updated 6 years ago