Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge
☆19May 1, 2019Updated 6 years ago
Alternatives and similar repositories for avc_nips_2018
Users that are interested in avc_nips_2018 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Adversarial Attacks and Defenses of Image Classifiers, NIPS 2017 competition track☆44Oct 7, 2017Updated 8 years ago
- Black-Box Adversarial Attack on Public Face Recognition Systems☆415Jul 6, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆26Jul 18, 2019Updated 6 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60May 14, 2019Updated 6 years ago
- TensorFlow: learn and practice☆11Aug 30, 2018Updated 7 years ago
- official code repo for paper "Merging Models on the Fly Without Retraining: A Sequential Approach to Scalable Continual Model Merging"☆25Oct 11, 2025Updated 5 months ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 2 years ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Related materials for robust and explainable machine learning☆48Jan 29, 2018Updated 8 years ago
- ☆10May 3, 2017Updated 8 years ago
- ☆13Nov 23, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated last year
- ☆16Dec 17, 2018Updated 7 years ago
- 5th place solution for ACM MM2021 Robust Logo Detection Grand Challenge☆13Dec 25, 2022Updated 3 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆39Jan 4, 2019Updated 7 years ago
- Code for our WWW'2020 paper "Efficient Neural Interaction Function Search for Collaborative Filtering"☆25Feb 16, 2020Updated 6 years ago
- CompFeat: Comprehensive Feature Aggregation for Video Instance Segmentation (AAAI 2021)☆19Dec 8, 2020Updated 5 years ago
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆146Oct 24, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The pytorch implementation of "Enhancing Hypergraph Neural Networks with Intent Disentanglement for Session-based Recommendation" (SIGIR'…☆23Dec 28, 2022Updated 3 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- This is our official implementation for the paper: “INMO: A Model-Agnostic and Scalable Module for Inductive Collaborative Filtering”.☆11Aug 10, 2022Updated 3 years ago
- Code for "Repetitive Activity Counting by Sight and Sound"☆24Oct 29, 2021Updated 4 years ago
- ☆12Mar 2, 2020Updated 6 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- ☆13Feb 4, 2022Updated 4 years ago
- Convolutional Restricted Boltzmann Machine☆15May 10, 2017Updated 8 years ago
- ☆66Jun 9, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Official implementation of "Improved Person Re-Identification Based on Saliency and Semantic Parsing with Deep Neural Network Models" IMA…☆14Dec 23, 2019Updated 6 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆63Feb 25, 2018Updated 8 years ago
- Exam summary for Computational Intelligence Lab, ETH Zurich, SS15☆13Aug 16, 2017Updated 8 years ago
- Code for Image Synthesis with a Convolutional Capsule Generative Adversarial Network☆20Mar 14, 2019Updated 7 years ago
- A machine learning library in Swift☆16Dec 19, 2016Updated 9 years ago
- My answer to LeetCode-Blind-Curated-75 problems to remember☆13May 26, 2020Updated 5 years ago
- Computer Vision Project, stitching different perspective images into a single smooth panorama using Laplacian Blending.☆10Oct 28, 2017Updated 8 years ago