☆33Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for data-poisoning-release
Users that are interested in data-poisoning-release are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Sep 29, 2020Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆55Mar 24, 2021Updated 5 years ago
- This is the official implementation of ClusTR: Clustering Training for Robustness paper.☆20Oct 20, 2021Updated 4 years ago
- Scalable Log Determinants for Gaussian Process Kernel Learning (https://arxiv.org/abs/1711.03481) (NIPS 2017)☆18Nov 10, 2017Updated 8 years ago
- ☆15Jun 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Nov 22, 2019Updated 6 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 5 years ago
- MultiPriv offers multilingual, multimodal PII entities and prompts for studying privacy risks in LLMs/VLMs. It also supports broader PII-…☆27Dec 10, 2025Updated 4 months ago
- ☆807Dec 29, 2020Updated 5 years ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆20Nov 7, 2020Updated 5 years ago
- A unified benchmark problem for data poisoning attacks☆162Oct 4, 2023Updated 2 years ago
- Blind Justice Code for the paper "Blind Justice: Fairness with Encrypted Sensitive Attributes", ICML 2018☆14Mar 20, 2019Updated 7 years ago
- Software relating to relational empirical risk minimization☆16Jun 12, 2021Updated 4 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- References for Papers at the Intersection of Causality and Fairness☆18Dec 3, 2018Updated 7 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 8 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- ☆46Feb 23, 2018Updated 8 years ago
- Fine-grained ImageNet annotations☆30May 25, 2020Updated 5 years ago
- machine reading comprehension with deep learning☆19Feb 6, 2018Updated 8 years ago
- ☆11Nov 13, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Contextual Bandits Action Elimination DQN☆21Jun 25, 2018Updated 7 years ago
- Pytorch implementation of "Hiding Images in Plain Sight: Deep Steganography" for Global NIPS Paper Implementation Challenge☆33Jan 29, 2018Updated 8 years ago
- ☆42Dec 8, 2022Updated 3 years ago
- The code reproduces the results of the experiments in the paper. In particular, it performs experiments in which machine-learning models …☆20Aug 16, 2021Updated 4 years ago
- Public code for a paper "Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks."☆35Dec 18, 2018Updated 7 years ago
- Scalable Bayes via Barycenter in Wasserstein Space☆10Sep 7, 2017Updated 8 years ago
- Code for "Towards a learning theory of cause-effect inference" (ICML 2015).☆30Aug 31, 2020Updated 5 years ago
- A pytorch toolbox designed for experimentation using a generalization of the Resnet design.☆15Jul 6, 2023Updated 2 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 11 months ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Listwise Learning to Rank by Exploring Unique Ratings (WSDM 2020)☆13Nov 2, 2025Updated 5 months ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 6 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- ☆12Jul 16, 2023Updated 2 years ago