Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength
☆38Feb 15, 2020Updated 6 years ago
Alternatives and similar repositories for TurningWeaknessIntoStrength
Users that are interested in TurningWeaknessIntoStrength are comparing it to the libraries listed below
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆71Jun 21, 2018Updated 7 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆137Nov 25, 2020Updated 5 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 2 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆129Oct 24, 2019Updated 6 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆136Dec 8, 2022Updated 3 years ago
- ☆21Jul 25, 2024Updated last year
- Open-source simulator for autonomous driving research.☆15Feb 2, 2019Updated 7 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆228Nov 9, 2019Updated 6 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆39Aug 2, 2019Updated 6 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- A scenario loader for the automotive simulator Carla 0.9.3. Loads scenarios based on OpenScenario 0.9.1.☆18Jun 3, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Jun 1, 2024Updated last year
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Jan 17, 2019Updated 7 years ago
- Getting Starting with NIMBUS-CORE☆10Dec 16, 2023Updated 2 years ago
- A community-run reference for state-of-the-art adversarial example defenses.☆52Oct 13, 2024Updated last year
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- A Closer Look at Accuracy vs. Robustness☆88May 17, 2021Updated 4 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆18May 13, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- Code for NeurIPS 2019 Paper☆48May 18, 2020Updated 5 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 4 years ago
- An implementation for the paper "A Little Is Enough: Circumventing Defenses For Distributed Learning" (NeurIPS 2019)☆29Jun 29, 2023Updated 2 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 9 months ago
- Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"☆29Jan 26, 2020Updated 6 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- ☆30Feb 1, 2019Updated 7 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Aug 8, 2019Updated 6 years ago