Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength
☆38Feb 15, 2020Updated 6 years ago
Alternatives and similar repositories for TurningWeaknessIntoStrength
Users that are interested in TurningWeaknessIntoStrength are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- This is the official repository for the paper "Laplacian Features for Learning with Hyperbolic Space"☆14Aug 8, 2022Updated 3 years ago
- Official implementation (learning part) for paper: Numerically Accurate Hyperbolic Embeddings Using Tiling-Based Models☆18Jul 25, 2024Updated last year
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆129Oct 24, 2019Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Instructions for using the graphite cluster☆22Apr 30, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆39Aug 2, 2019Updated 6 years ago
- A tool for ameliorating the Cornell course enroll system!☆16Dec 27, 2022Updated 3 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆113Feb 14, 2018Updated 8 years ago
- ☆21Jul 25, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Jan 19, 2024Updated 2 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Jan 17, 2019Updated 7 years ago
- Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"☆29Jan 26, 2020Updated 6 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Recurrent Convolutional Neural Network for Semantic Classification☆12Jul 10, 2015Updated 10 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- Mean Absolute Error Does Not Treat Examples Equally and Gradient Magnitude’s Variance Matters☆30Nov 21, 2020Updated 5 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- Pytorch implementation of Wasserstein Auto-Encoders☆25Feb 7, 2018Updated 8 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- Open-source simulator for autonomous driving research.☆15Feb 2, 2019Updated 7 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21Sep 23, 2025Updated 6 months ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- LoopPredictor: Predicting unknown enhancer-mediated genome topology by an ensemble machine learning model☆14Jun 18, 2021Updated 4 years ago
- [JMLR] TRADES + random smoothing for certifiable robustness☆14Sep 13, 2020Updated 5 years ago
- Hack, Tailor, Trim your tensorflow frozen graph in the way you need!☆17Mar 1, 2019Updated 7 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- A scenario loader for the automotive simulator Carla 0.9.3. Loads scenarios based on OpenScenario 0.9.1.☆18Jun 3, 2019Updated 6 years ago