☆43Jan 25, 2024Updated 2 years ago
Alternatives and similar repositories for ImageNet-Patch
Users that are interested in ImageNet-Patch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Mar 16, 2022Updated 4 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆105Updated this week
- Security evaluation module with onnx, pytorch, and SecML.☆13Apr 9, 2022Updated 4 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Industrial Software Development (MSc Computer Engineering, Cybersecurity and AI, University of Cagliari, Italy)☆22Dec 17, 2025Updated 3 months ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- AdvT-shirt-1K A Physical-world Adversarial T-shirt Dataset for Adversarial Robustness Evaluation☆14Aug 7, 2025Updated 8 months ago
- Attack benchmark repository☆23Nov 25, 2025Updated 4 months ago
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆20Oct 30, 2023Updated 2 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆26Nov 13, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- Latex template for Oxford integrated thesis☆19Apr 7, 2025Updated last year
- A Python library for Secure and Explainable Machine Learning☆191Jun 23, 2025Updated 9 months ago
- Code for "DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks"☆15Jul 13, 2022Updated 3 years ago
- this is for the ACM MM paper---Backdoor Attack on Crowd Counting☆17Jul 10, 2022Updated 3 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- [ICML 2023] "Robust Weight Signatures: Gaining Robustness as Easy as Patching Weights?" by Ruisi Cai, Zhenyu Zhang, Zhangyang Wang☆16May 4, 2023Updated 2 years ago
- Invariant representation learning from EEG within discriminative CNN architectures via adversarial censoring.☆14Feb 5, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- The implementation of our paper: Towards Robust Vision Transformer (CVPR2022)☆142Aug 16, 2022Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Create adversarial attacks against machine learning Windows malware detectors☆246Nov 27, 2025Updated 4 months ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- Code for generating a single image pretraining dataset☆13Aug 3, 2021Updated 4 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- Implementation of "Adversarial purification with Score-based generative models", ICML 2021☆30Oct 24, 2021Updated 4 years ago
- ☆21Nov 19, 2021Updated 4 years ago
- Pytorch implementation of SphereGAN(Sphere Generative Adversarial Network Based on Geometric Moment Matching)☆15Jul 2, 2019Updated 6 years ago
- [ICLR 2021: Spotlight] Source code for the paper "A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Infer…☆14Feb 16, 2022Updated 4 years ago
- ☆25Jun 23, 2021Updated 4 years ago
- Resources related to the model cards for ML☆11Mar 16, 2021Updated 5 years ago