owkin / grad-cnns
Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"
☆29Updated 5 years ago
Alternatives and similar repositories for grad-cnns:
Users that are interested in grad-cnns are comparing it to the libraries listed below
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 4 years ago
- ☆87Updated 6 months ago
- Geometric Certifications of Neural Nets☆41Updated 2 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Updated 5 years ago
- ☆27Updated 6 years ago
- ☆74Updated 5 years ago
- Implementation of the Deep Frank-Wolfe Algorithm -- Pytorch☆62Updated 3 years ago
- This repository is no longer maintained. Check☆81Updated 4 years ago
- ☆31Updated 4 years ago
- The Full Spectrum of Deepnet Hessians at Scale: Dynamics with SGD Training and Sample Size☆17Updated 5 years ago
- Source for paper "Attacking Binarized Neural Networks"☆23Updated 6 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆11Updated 4 years ago
- CVPR'19 experiments with (on-manifold) adversarial examples.☆44Updated 4 years ago
- ☆26Updated 5 years ago
- SGD and Ordered SGD codes for deep learning, SVM, and logistic regression☆35Updated 4 years ago
- ☆20Updated 6 months ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Updated 6 months ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Updated 4 years ago
- OD-test: A Less Biased Evaluation of Out-of-Distribution (Outlier) Detectors (PyTorch)☆62Updated last year
- [ICML'20] Multi Steepest Descent (MSD) for robustness against the union of multiple perturbation models.☆26Updated 6 months ago
- Code for the signSGD paper☆83Updated 4 years ago
- Code for Fong and Vedaldi 2017, "Interpretable Explanations of Black Boxes by Meaningful Perturbation"☆30Updated 5 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 5 years ago
- A Closer Look at Accuracy vs. Robustness☆88Updated 3 years ago
- This code reproduces the results of the paper, "Measuring Data Leakage in Machine-Learning Models with Fisher Information"☆49Updated 3 years ago
- Implementation of Methods Proposed in Preventing Gradient Attenuation in Lipschitz Constrained Convolutional Networks (NeurIPS 2019)☆34Updated 4 years ago
- Code for Self-Tuning Networks (ICLR 2019) https://arxiv.org/abs/1903.03088☆53Updated 5 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Updated 3 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆92Updated last year