Tensorflow implementation of "Defense against Universal Adversarial Perturbations"
☆10Apr 16, 2018Updated 8 years ago
Alternatives and similar repositories for Pertrubation_Rectifying_Network
Users that are interested in Pertrubation_Rectifying_Network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- NeurIPS22 "RankFeat: Rank-1 Feature Removal for Out-of-distribution Detection" and T-PAMI Extension☆20Feb 21, 2025Updated last year
- Official repository for ICCV 2023: Get the Best of Both Worlds: Improving Accuracy and Transferability by Grassmann Class☆13Oct 16, 2023Updated 2 years ago
- Implementation of the Budgeted Super Networks☆25Feb 25, 2019Updated 7 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆16Jul 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Official Code for AdvRush: Searching for Adversarially Robust Neural Architectures (ICCV '21)☆12Dec 27, 2021Updated 4 years ago
- A curated list of papers for the transferability of adversarial examples☆77Jul 8, 2024Updated last year
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- Metaheuristics for solving bilevel optimization problems.☆13Mar 5, 2024Updated 2 years ago
- code for paper "Physical-World Optical Adversarial Attacks on 3D Face Recognition"☆20Oct 19, 2023Updated 2 years ago
- Models for the Collaborative Drawing (CoDraw) task☆13Jan 15, 2019Updated 7 years ago
- Web Interface for gaze recording: CVPR 2018☆10Jul 10, 2018Updated 7 years ago
- This is a modified version of the code for Hyperspectral image classification using CNN (Post-processing code is written in python).☆10Mar 3, 2018Updated 8 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆61Jun 25, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆10Aug 26, 2022Updated 3 years ago
- Official repo for the paper "Make Some Noise: Reliable and Efficient Single-Step Adversarial Training" (https://arxiv.org/abs/2202.01181)☆25Oct 17, 2022Updated 3 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- Repository for SoMeLVLM: A Large Vision Language Model for Social Media Processing☆14Oct 9, 2025Updated 7 months ago
- [ICLR 2022] Official repository for "Robust Unlearnable Examples: Protecting Data Against Adversarial Learning"☆49Jul 20, 2024Updated last year
- A basic architecture of "DA-GAN: Instance-level Image Translation by Deep Attention Generative Adversarial Networks"☆15Oct 6, 2018Updated 7 years ago
- Bullseye Polytope Clean-Label Poisoning Attack☆18Nov 5, 2020Updated 5 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Connecting Pixels to Privacy and Utility: Automatic Redaction of Private Information in Images, CVPR 2018☆19Jul 3, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Md5 碰撞生成实现,去掉了boost依赖,简化编译☆12Jan 25, 2018Updated 8 years ago
- Revisiting Residual Networks for Adversarial Robustness: An Architectural Perspective☆19Jun 7, 2024Updated last year
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated last year
- ☆31May 30, 2024Updated last year
- ☆17Apr 8, 2015Updated 11 years ago
- Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes☆23Jun 14, 2020Updated 5 years ago
- Emergence of exploratory look-around behaviors through active observation completion (Science Robotics 2019)☆14Jan 21, 2022Updated 4 years ago
- PFCC 社区博客☆14Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 5 years ago
- Implementation of the paper "Understanding anomaly detection with deep invertible networks through hierarchies of distributions and featu…☆42Nov 24, 2020Updated 5 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆22Mar 1, 2019Updated 7 years ago
- ☆17Mar 14, 2018Updated 8 years ago
- 提取 PDF 文件中的文本,使用 OpenAI 进行翻译,并将翻译结果写入 txt 文件中。☆12Jun 10, 2023Updated 2 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆66Nov 23, 2019Updated 6 years ago
- 南京信息工程大学硕士学位论文Latex模板☆14Jun 10, 2020Updated 5 years ago