Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength
☆38Feb 15, 2020Updated 6 years ago
Alternatives and similar repositories for TurningWeaknessIntoStrength
Users that are interested in TurningWeaknessIntoStrength are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 3 years ago
- Notebooks for reproducing the paper "Computer Vision with a Single (Robust) Classifier"☆129Oct 24, 2019Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Instructions for using the graphite cluster☆22Apr 30, 2019Updated 7 years ago
- This project's goal is to evaluate the privacy leakage of differentially private machine learning models.☆136Dec 8, 2022Updated 3 years ago
- [ICCV'19] Improving Adversarial Robustness via Guided Complement Entropy☆39Aug 2, 2019Updated 6 years ago
- PDF Malware Parser☆20Jun 3, 2016Updated 9 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆113Feb 14, 2018Updated 8 years ago
- ☆21Jul 25, 2024Updated last year
- ☆14Jan 19, 2024Updated 2 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆90Jan 17, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code and manuscript for "Efficient Per-Example Gradient Computations in Convolutional Neural Networks"☆29Jan 26, 2020Updated 6 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees☆20Dec 16, 2020Updated 5 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Unofficial implementation for the paper 'Improving Diffusion Models for Inverse Problems using Manifold Constraints'[https://arxiv.org/ab…☆12Aug 21, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Distribution-Aware Prompt Tuning for Vision-Language Models (ICCV 2023)☆46Dec 11, 2023Updated 2 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- Code for "Testing Robustness Against Unforeseen Adversaries"☆80Jul 25, 2024Updated last year
- Mean Absolute Error Does Not Treat Examples Equally and Gradient Magnitude’s Variance Matters☆30Nov 21, 2020Updated 5 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆38Nov 22, 2022Updated 3 years ago
- Pytorch implementation of Wasserstein Auto-Encoders☆25Feb 7, 2018Updated 8 years ago
- Code repository of the paper "Alleviating Adversarial Attacks on Variational Autoencoders with MCMC" published at NeurIPS 2022. https://a…☆10Dec 14, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆34Sep 18, 2020Updated 5 years ago
- ☆22Sep 23, 2025Updated 7 months ago
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- LoopPredictor: Predicting unknown enhancer-mediated genome topology by an ensemble machine learning model☆14Jun 18, 2021Updated 4 years ago
- awd attack framework,Django + Mysql☆16Feb 8, 2025Updated last year
- [JMLR] TRADES + random smoothing for certifiable robustness☆14Sep 13, 2020Updated 5 years ago
- Hack, Tailor, Trim your tensorflow frozen graph in the way you need!☆17Mar 1, 2019Updated 7 years ago