Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength
☆38Feb 15, 2020Updated 6 years ago
Alternatives and similar repositories for TurningWeaknessIntoStrength
Users that are interested in TurningWeaknessIntoStrength are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Code repo for the paper "Privacy-aware Compression for Federated Data Analysis".☆18May 31, 2023Updated 2 years ago
- SkinnerDB is an analytical database management system. It uses adaptive processing and reinforcement learning to find near-optimal join o…☆54Mar 3, 2024Updated 2 years ago
- Repo for the paper "Bounding Training Data Reconstruction in Private (Deep) Learning".☆11Jun 16, 2023Updated 2 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆129Oct 24, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Instructions for using the graphite cluster☆22Apr 30, 2019Updated 6 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆135Dec 8, 2022Updated 3 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆39Aug 2, 2019Updated 6 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- ☆21Jul 25, 2024Updated last year
- Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"☆29Jan 26, 2020Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mean Absolute Error Does Not Treat Examples Equally and Gradient Magnitude’s Variance Matters☆30Nov 21, 2020Updated 5 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- ☆27Apr 9, 2024Updated 2 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- A community-run reference for state-of-the-art adversarial example defenses.☆52Oct 13, 2024Updated last year
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- Open-source simulator for autonomous driving research.☆15Feb 2, 2019Updated 7 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆47Oct 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- A scenario loader for the automotive simulator Carla 0.9.3. Loads scenarios based on OpenScenario 0.9.1.☆18Jun 3, 2019Updated 6 years ago
- Simulation of 802.11 DCF MAC protocol and 802.11 with RTS/CTS☆11Nov 21, 2017Updated 8 years ago
- A collection of methods to fool the deep neural network☆76Sep 19, 2024Updated last year
- Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"☆65Jun 22, 2022Updated 3 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆16Nov 9, 2025Updated 5 months ago