Adversarial learning by utilizing model interpretation
☆10Oct 19, 2018Updated 7 years ago
Alternatives and similar repositories for Interpretation2Adversary
Users that are interested in Interpretation2Adversary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TODO ;)☆12Aug 13, 2018Updated 7 years ago
- PyTorch code for WWW 19 paper: On Attribution of Recurrent Neural Network Predictions via Additive Decomposition☆11Mar 18, 2021Updated 5 years ago
- ☆16Oct 23, 2019Updated 6 years ago
- PyTorch code for KDD 18 paper: Towards Explanation of DNN-based Prediction with Guided Feature Inversion☆21Feb 4, 2019Updated 7 years ago
- Companion code for the self-supervised anomaly detection algorithm proposed in the paper "Detecting Anomalies within Time Series using Lo…☆17Oct 29, 2021Updated 4 years ago
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- ☆44May 17, 2020Updated 5 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- Sensor data science and AI tutorial☆11Feb 15, 2026Updated last month
- A comparison of human attention with computational attention mechanisms☆12Jul 3, 2020Updated 5 years ago
- Code accompanying our paper "Finding trainable sparse networks through Neural Tangent Transfer" to be published at ICML-2020.☆13Jun 14, 2020Updated 5 years ago
- ☆12May 14, 2021Updated 4 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Deep anomaly detection with scale learning☆11May 26, 2023Updated 2 years ago
- ICDM19 - Anomaly Detection / Outlier Detection for Mixed data☆14Dec 6, 2020Updated 5 years ago
- ☆14Jun 21, 2019Updated 6 years ago
- [CIKM2023] GiGaMA: Generalizable Graph Masked Autoencoder via Collaborative Latent Space Reconstruction☆18Aug 31, 2023Updated 2 years ago
- ☆15Jul 5, 2024Updated last year
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆69Jul 12, 2025Updated 8 months ago
- Learning algorithm described in "A New PAC-Bayesian Perspective on Domain Adaptation" (see http://arxiv.org/abs/1506.04573)☆11Oct 30, 2018Updated 7 years ago
- Cost-Aware Robust Tree Ensembles for Security Applications (Usenix Security'21) https://arxiv.org/pdf/1912.01149.pdf☆18Mar 2, 2021Updated 5 years ago
- A tutorial for using Hadoop with Python and Hive☆10May 26, 2015Updated 10 years ago
- The code for Template-GPT-2 Generation Model for Logic2Text Dataset☆18Jun 1, 2020Updated 5 years ago
- Ready to run Jupyter notebook docker image with Python 3.9, OpenCV 4 and more☆11Feb 12, 2022Updated 4 years ago
- PyTorch implementation of SNGP as found in https://arxiv.org/pdf/2006.10108.pdf☆17Sep 29, 2024Updated last year
- telegram bot for quickly downloading from anna's archive☆11Dec 5, 2022Updated 3 years ago
- 谷歌开源项目Python风格指南与编写简洁可读代码的建议☆13Sep 10, 2021Updated 4 years ago
- Official implementation of AAAI'22 paper "ProtGNN: Towards Self-Explaining Graph Neural Networks"☆50Oct 25, 2022Updated 3 years ago
- ☆13May 11, 2021Updated 4 years ago
- ☆13Apr 21, 2023Updated 2 years ago
- OVAL framework for BaB-based Neural Network Verification☆17Dec 18, 2025Updated 3 months ago
- [ACL 2024] PokeMQA: Programmable knowledge editing for Multi-hop Question Answering☆19Jun 8, 2024Updated last year
- DeepSphere for Anomaly Detection☆14May 31, 2019Updated 6 years ago
- Models for explainable recommendation.☆12Jan 19, 2024Updated 2 years ago
- [NeurIPS2023] Black-box Backdoor Defense via Zero-shot Image Purification☆16Oct 31, 2023Updated 2 years ago
- SurvivalQuilts: Temporal Quilting for Survival Analysis☆10Jan 9, 2024Updated 2 years ago
- Deep learning resource☆21Jul 4, 2020Updated 5 years ago
- ☆15Sep 25, 2020Updated 5 years ago
- ☆15Aug 5, 2020Updated 5 years ago