mldbai / tensorflow-models
Models built with TensorFlow
☆26Updated 8 years ago
Alternatives and similar repositories for tensorflow-models:
Users that are interested in tensorflow-models are comparing it to the libraries listed below
- Implementation of our NeurIPS 2018 paper: Deep Defense: Training DNNs with Improved Adversarial Robustness☆39Updated 6 years ago
- A collection of methods to fool the deep neural network☆77Updated 5 months ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 3 years ago
- [ICLR 2019] ProbGAN: Towards Probabilistic GAN with Theoretical Guarantees☆32Updated 5 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆85Updated 7 years ago
- ☆74Updated 5 years ago
- ☆29Updated 6 years ago
- Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"☆29Updated 5 years ago
- Blog https://medium.com/neuralmachine/knowledge-distillation-dc241d7c2322☆60Updated 6 years ago
- pytorch implementation of Structured Bayesian Pruning☆19Updated 6 years ago
- Zero-Shot Knowledge Distillation in Deep Networks☆64Updated 2 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆70Updated 6 years ago
- CVPR 2019 paper "Disentangling Adversarial Robustness and Generalization".☆14Updated 5 years ago
- PyTorch implementation of "EfficientNet", ICML 2019☆43Updated 5 years ago
- Accompanying code for the paper "Zero-shot Knowledge Transfer via Adversarial Belief Matching"☆140Updated 4 years ago
- ☆26Updated 5 years ago
- Using federated learning and CNNs to analyze X-ray images of Lungs and determining whether pneumonia is present.☆33Updated 5 years ago
- ☆66Updated 6 years ago
- Pytorch implementation of Real Time Image Saliency for Black Box Classifiers https://arxiv.org/abs/1705.07857☆58Updated 5 years ago
- Comparison of gradient estimation techniques for black-box adversarial examples☆11Updated 6 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆49Updated 3 years ago
- Discovering Neural Wirings (https://arxiv.org/abs/1906.00586)☆138Updated 5 years ago
- Dual Path Networks on cifar-10 and fashion-mnist datasets☆18Updated 7 years ago
- Unsupervised Data Augmentation experiments in PyTorch☆59Updated 5 years ago
- ☆15Updated 7 years ago
- A challenge to investigate the security of the InstaHide protocol.☆12Updated 4 years ago
- PyTorch implementation of "SNAPSHOT ENSEMBLES: TRAIN 1, GET M FOR FREE" [WIP]☆36Updated 7 years ago
- Implementation of Octave Convolution from Drop an Octave: Reducing Spatial Redundancy in Convolutional Neural Networks with Octave Convol…☆56Updated 5 years ago
- InstaHide: Instance-hiding Schemes for Private Distributed Learning☆50Updated 4 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆59Updated 5 years ago