safreita1 / unmaskLinks
Adversarial detection and defense for deep learning systems using robust feature alignment
☆18Updated 5 years ago
Alternatives and similar repositories for unmask
Users that are interested in unmask are comparing it to the libraries listed below
Sorting:
- Detection of adversarial examples using influence functions and nearest neighbors☆37Updated 2 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Updated 3 years ago
- ☆53Updated 3 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Updated 11 months ago
- ☆11Updated 2 years ago
- Craft poisoned data using MetaPoison☆53Updated 4 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- ☆58Updated 3 years ago
- ☆26Updated 6 years ago
- Codes for reproducing the experimental results in "Proper Network Interpretability Helps Adversarial Robustness in Classification", publi…☆13Updated 5 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Updated 4 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Updated 4 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Updated 3 years ago
- ConvexPolytopePosioning☆37Updated 5 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆17Updated last year
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 3 years ago
- ☆16Updated 5 years ago
- Paper sharing in adversary related works☆44Updated 2 months ago
- ☆23Updated 2 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Updated 4 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆32Updated 5 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 6 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆20Updated 5 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Updated 2 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Updated 3 years ago