Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples
☆26Feb 6, 2020Updated 6 years ago
Alternatives and similar repositories for PixelDefend
Users that are interested in PixelDefend are comparing it to the libraries listed below
Sorting:
- ☆19Mar 5, 2018Updated 7 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- The code of EMNLP 2019 paper "A Split-and-Recombine Approach for Follow-up Query Analysis"☆18Jul 20, 2023Updated 2 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- ☆11Jan 2, 2020Updated 6 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Feb 18, 2021Updated 5 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- ☆18Mar 24, 2023Updated 2 years ago
- Data-Efficient Backdoor Attacks☆20Jun 15, 2022Updated 3 years ago
- ☆20May 6, 2022Updated 3 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Jan 18, 2022Updated 4 years ago
- ☆25Feb 10, 2021Updated 5 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- ReconNER, Debug annotated Named Entity Recognition (NER) data for inconsistencies and get insights on improving the quality of your data.☆35Jul 26, 2020Updated 5 years ago
- Official repository of the paper: Marking Code Without Breaking It: Code Watermarking for Detecting LLM-Generated Code (Findings of EACL …☆12Feb 11, 2026Updated 2 weeks ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 7 years ago
- ☆36May 19, 2023Updated 2 years ago
- ☆12May 6, 2022Updated 3 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Apr 1, 2020Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- This is the code repo of our Pattern Recognition journal on IPR protection of Image Captioning Models☆11Aug 29, 2023Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- Python diff / merge basic dictionaries / lists☆11May 1, 2016Updated 9 years ago
- Samples for partner application development (OEM, MO, IHV) for Window☆18Jun 12, 2023Updated 2 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Jul 29, 2021Updated 4 years ago
- ☆11Dec 9, 2018Updated 7 years ago