serval-uni-lu / tabularbenchLinks
TabularBench: Adversarial robustness benchmark for tabular data
☆18Updated 6 months ago
Alternatives and similar repositories for tabularbench
Users that are interested in tabularbench are comparing it to the libraries listed below
Sorting:
- ☆66Updated 4 years ago
- ☆44Updated 2 years ago
- Computationally friendly hyper-parameter search with DP-SGD☆25Updated 5 months ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last month
- Code for ML Doctor☆91Updated 10 months ago
- Code relative to "Adversarial robustness against multiple and single $l_p$-threat models via quick fine-tuning of robust classifiers"☆19Updated 2 years ago
- ☆31Updated 9 months ago
- code release for "Unrolling SGD: Understanding Factors Influencing Machine Unlearning" published at EuroS&P'22☆22Updated 3 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Library for training globally-robust neural networks.☆28Updated last year
- ☆11Updated 2 years ago
- ☆32Updated 3 years ago
- Codebase for information theoretic shapley values to explain predictive uncertainty.This repo contains the code related to the paperWatso…☆21Updated 11 months ago
- ☆30Updated 3 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Updated last year
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Updated 4 years ago
- Private Evolution: Generating DP Synthetic Data without Training [ICLR 2024, ICML 2024 Spotlight]☆97Updated 3 weeks ago
- Membership Inference Attacks and Defenses in Neural Network Pruning☆28Updated 2 years ago
- Official github page for the paper "Evaluating Deep Unlearning in Large Language Model"☆14Updated 2 months ago
- ☆13Updated 2 years ago
- ☆31Updated 2 years ago
- ☆27Updated 2 years ago
- This repository contains code and data of the paper **On the Limitations of Continual Learning for Malware Classification**, accepted to …☆18Updated last year
- ☆11Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- ☆24Updated 2 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- ☆21Updated 5 months ago