[TPAMI 2019] The implementation for "Direction Concentration Learning: Enhancing Congruency in Machine Learning"
☆23Jan 30, 2020Updated 6 years ago
Alternatives and similar repositories for congruency
Users that are interested in congruency are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NeurIPS'23: Energy Discrepancies: A Score-Independent Loss for Energy-Based Models☆17Oct 22, 2024Updated last year
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 10 months ago
- Reproduce of 'Weakly Supervised Coupled Networks for Visual Sentiment Analysis'☆13Nov 7, 2019Updated 6 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated 2 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Oct 28, 2025Updated 6 months ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- PyTorch implementation of JEM++: Improved Techniques for Training JEM☆13Mar 11, 2023Updated 3 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆46Apr 15, 2025Updated last year
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆54Oct 12, 2020Updated 5 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Local Discriminative Regions for Scene Recognition (ACMMM 2018)☆22Oct 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Sep 9, 2024Updated last year
- Official Code for the ACCV 2022 paper Diffusion Models for Counterfactual Explanations☆30Mar 12, 2025Updated last year
- huggingface dataset with remote download support☆16Mar 13, 2026Updated last month
- ☆36Oct 20, 2020Updated 5 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated 2 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Introduction to exploratory data analysis course for Mathematics and data analysis studies in Spring 2022/2023☆16Aug 8, 2023Updated 2 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Code for CVPR22 paper: Exploring Structure-aware Transformer over Interaction Proposals for Human-Object Interaction Detection.☆49Jun 5, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- AnyDoor: Test-Time Backdoor Attacks on Multimodal Large Language Models☆61Apr 8, 2024Updated 2 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆18Jun 27, 2021Updated 4 years ago
- Code for the paper "Detecting Any Human-Object Interaction Relationship: Universal HOI Detector with Spatial Prompt Learning on Foundatio…☆28Nov 8, 2023Updated 2 years ago
- DiG-IN: Diffusion Guidance for Investigating Networks - Uncovering Classifier Differences, Neuron Visualisations, and Visual Counterfactu…☆10Oct 9, 2024Updated last year
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 3 years ago
- 🚴♂️ ConsNet: Learning Consistency Graph for Zero-Shot Human-Object Interaction Detection (MM 2020)☆35Jul 2, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆70Mar 5, 2026Updated last month
- ☆13Sep 26, 2024Updated last year
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 3 years ago
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆31Dec 2, 2023Updated 2 years ago
- Official code for Generative Fractional Diffusion Models☆17Jan 16, 2025Updated last year
- ☆19Mar 26, 2022Updated 4 years ago
- Implementation of TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems (https://arxiv.org/pdf/190…☆19Apr 13, 2023Updated 3 years ago