Vision based algorithms for falsification of convolutional neural networks
☆12Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for SafeCV
Users that are interested in SafeCV are comparing it to the libraries listed below
Sorting:
- Testing Deep Neural Networks☆15Jul 4, 2018Updated 7 years ago
- ☆18Mar 26, 2019Updated 6 years ago
- Safety Verification of Deep Neural Networks☆50Feb 5, 2018Updated 8 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- ☆27May 27, 2020Updated 5 years ago
- With Viola age classification library, you can find age range of a give face bitmap image.☆22Aug 26, 2022Updated 3 years ago
- Code corresponding to the paper "Adversarial Examples are not Easily Detected..."☆90Nov 1, 2017Updated 8 years ago
- Python package for inference with Gaussian processes☆11Mar 25, 2015Updated 10 years ago
- Reachability analysis and synthesis of parameters for polynomial dynamical systems☆11May 15, 2023Updated 2 years ago
- 使用AIDL进行跨进程通信☆11Feb 18, 2017Updated 9 years ago
- ☆44Aug 25, 2017Updated 8 years ago
- OpenCV implementation of the poisson image blend and Mean-Value-Coordinate image clone method☆10Nov 14, 2017Updated 8 years ago
- DeepXplore code release☆397Mar 17, 2022Updated 3 years ago
- Example of face expression,face age, face gender on Android☆10Jul 24, 2020Updated 5 years ago
- Repository containing code for getting statistical guarantees on properties of BNNs☆13Apr 24, 2019Updated 6 years ago
- A DSL for Linear Temporal Logic + Interface with Z3 for solving☆11Mar 12, 2015Updated 10 years ago
- ☆10Nov 5, 2016Updated 9 years ago
- mqtt协议聊天demo☆10Dec 18, 2018Updated 7 years ago
- Ensemble/Blender example in R using Caret (companion code for YouTube video: https://www.youtube.com/watch?v=k7sTiTWWCXM)☆11Sep 19, 2014Updated 11 years ago
- Dionis predictors blender☆10Oct 21, 2015Updated 10 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Solution to the Kaggle Facebook Recruiting IV contest☆11Feb 21, 2016Updated 10 years ago
- Machine Learning course at dsai.asia☆16Aug 17, 2022Updated 3 years ago
- Blog for the Open Institute for Advanced Study☆10Oct 30, 2020Updated 5 years ago
- Mozilla's Community Support Software☆19Mar 29, 2021Updated 4 years ago
- Style Transfer based on Generative Adversarial Network☆15Sep 3, 2017Updated 8 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 4 years ago
- Optimizers for performing approximate Bayesian inference on neural network parameters with Tensorflow and JAX☆13Feb 17, 2024Updated 2 years ago
- Concolic Testing for Deep Neural Networks☆119Jul 16, 2021Updated 4 years ago
- PyData Silicon Valley 2014 Code + Presentation☆36Jun 30, 2014Updated 11 years ago
- The released code of Neurify in NIPS 2018☆50Dec 8, 2022Updated 3 years ago
- Generation of sequential and concurrent unit tests to find correctness and performance problems in Java classes☆16Jul 20, 2019Updated 6 years ago
- yolov5第四版☆15Oct 13, 2021Updated 4 years ago
- ☆14Jan 5, 2021Updated 5 years ago
- Prediction model for Kaggle/Rossmann competition.☆13Nov 23, 2015Updated 10 years ago
- Adversarial Robustness on In- and Out-Distribution Improves Explainability☆12Feb 10, 2022Updated 4 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago
- ☆57Mar 24, 2023Updated 2 years ago
- A neural network made for OCR of handwritten uppercase English letters based on Fukushima's 1988 Neocognitron.☆17Jun 5, 2014Updated 11 years ago