Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples
☆15Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for Pytorch_MagNet
Users that are interested in Pytorch_MagNet are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Defense GAN in pytorch☆13May 12, 2019Updated 6 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆101Oct 13, 2018Updated 7 years ago
- ☆13Nov 10, 2019Updated 6 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Aug 27, 2021Updated 4 years ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- AGCN - Spectral ChevNet built on Adaptive, trainable graphs☆12Aug 16, 2020Updated 5 years ago
- Code for the paper "Optimal Off-Policy Evaluation from Multiple Logging Policies"☆15Jul 17, 2021Updated 4 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- Seminar: intro to deep learning with tensorflow☆13Jun 27, 2017Updated 8 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated last month
- ☆11Jul 19, 2022Updated 3 years ago
- [CVPR 2024] Efficient Hyperparameter Optimization with Adaptive Fidelity Identification☆11Jul 12, 2024Updated last year
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- ☆47Feb 21, 2020Updated 6 years ago
- Official implementation of NeurIPS'24 Spotlight paper "Monte Carlo Tree Search based Space Transfer for Black-box Optimization".☆12Nov 28, 2024Updated last year
- Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)☆11Aug 29, 2020Updated 5 years ago
- novel deep learning research works with PaddlePaddle☆10May 31, 2020Updated 5 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Detailed guide to help you understand how to train CRF as RNN☆10May 26, 2017Updated 8 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- ☆12Oct 20, 2020Updated 5 years ago
- Lightweight Face Image Quality Assessment☆12Nov 19, 2021Updated 4 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 4 months ago
- ☆42Dec 8, 2022Updated 3 years ago
- Converting VIS json label to VOS format☆12Feb 16, 2021Updated 5 years ago
- Opencv based implementation of Torchvision.Transforms☆12Oct 25, 2022Updated 3 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- Code of the paper "Part Detector Discovery in Deep Convolutional Neural Networks" by Marcel Simon, Erik Rodner and Joachim Denzler☆17Nov 12, 2014Updated 11 years ago
- Constrainted optimization algorithms in python including linear conjugate gradient, log barrier, primal-dual interior-point methods☆12Jul 7, 2019Updated 6 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification☆15Mar 25, 2023Updated 2 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 4 years ago