Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples
☆15Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for Pytorch_MagNet
Users that are interested in Pytorch_MagNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Defense GAN in pytorch☆13May 12, 2019Updated 6 years ago
- ☆13Nov 10, 2019Updated 6 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆12Jun 18, 2019Updated 6 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Simple implementation of the C&W attack on a pre-trained Keras's InceptionV3 on Imagenet☆10Jan 4, 2021Updated 5 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 9 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆21Apr 16, 2026Updated 2 weeks ago
- ☆42Dec 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Jul 19, 2022Updated 3 years ago
- ☆17Oct 22, 2020Updated 5 years ago
- Securing Embedded Systems with Return Address Integrity☆16Aug 19, 2024Updated last year
- Lightweight Face Image Quality Assessment☆12Nov 19, 2021Updated 4 years ago
- anime face detector and model learner with deep learning.☆15Sep 22, 2015Updated 10 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆16Nov 9, 2025Updated 5 months ago
- ☆47Feb 21, 2020Updated 6 years ago
- [NeurIPS 2025] Watch and Listen: Understanding Audio-Visual-Speech Moments with Multimodal LLM☆24Feb 10, 2026Updated 2 months ago
- an implement of hog+svm &hog+cascade,using c++☆12Apr 3, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Feedforward implementation of Lightweight Probabilistic Deep Networks for Keras and Tensorflow☆14Jul 1, 2019Updated 6 years ago
- NoiseGrad (and its extension NoiseGrad++) is a method to enhance explanations of artificial neural networks by adding noise to model weig…☆22May 11, 2023Updated 2 years ago
- Natural Universal Trigger Search (NUTS)☆21Apr 17, 2021Updated 5 years ago
- PyTorch implementation of a self-attentive speaker embedding☆17Sep 24, 2019Updated 6 years ago
- ☆26Sep 30, 2022Updated 3 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆113Jul 7, 2022Updated 3 years ago
- My usercode area☆15Dec 21, 2016Updated 9 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- Non-official implementation of Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection☆24Jun 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementation of "Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches"☆25Aug 31, 2022Updated 3 years ago
- A rich-documented PyTorch implementation of Carlini-Wagner's L2 attack.☆60Aug 3, 2018Updated 7 years ago
- PyTorch implementation of 'Vanilla' Gradient, Grad-CAM, Guided backprop, Integrated Gradients and their SmoothGrad variants.☆20Feb 15, 2026Updated 2 months ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆23Dec 21, 2023Updated 2 years ago
- Vanilla, Convolutional, VAE, Conditional VAE☆20Dec 20, 2018Updated 7 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆66Nov 23, 2019Updated 6 years ago