Interval attacks (adversarial ML)
☆21Jun 17, 2019Updated 6 years ago
Alternatives and similar repositories for Interval-Attack
Users that are interested in Interval-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The library for symbolic interval☆22Jun 23, 2020Updated 5 years ago
- β-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Verification☆31Nov 9, 2021Updated 4 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Apr 8, 2018Updated 8 years ago
- Fourth edition of VNN COMP (2023)☆16Apr 12, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Benchmarks for the VNN Comp 2023☆16Jun 7, 2024Updated last year
- The official repo for GCP-CROWN paper☆13Sep 26, 2022Updated 3 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- ☆15Dec 7, 2021Updated 4 years ago
- Code for paper "Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers"☆17Jan 27, 2023Updated 3 years ago
- Reference implementations for RecurJac, CROWN, FastLin and FastLip (Neural Network verification and robustness certification algorithms)…☆27Nov 23, 2019Updated 6 years ago
- The released code of Neurify in NIPS 2018☆51Dec 8, 2022Updated 3 years ago
- The released code of ReluVal in USENIX Security 2018☆60Mar 4, 2020Updated 6 years ago
- Comparison of gradient estimation techniques for black-box adversarial examples☆11Oct 31, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AAAI 2019 oral presentation☆53May 30, 2025Updated 11 months ago
- ☆17Aug 2, 2022Updated 3 years ago
- ☆25Mar 26, 2026Updated last month
- [NeurIPS 2021] Fast Certified Robust Training with Short Warmup☆25Jun 7, 2025Updated 11 months ago
- Robustness for Non-Parametric Classification: A Generic Attack and Defense☆18Nov 21, 2022Updated 3 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- ☆37Feb 13, 2020Updated 6 years ago
- Official implementation for Training Certifiably Robust Neural Networks with Efficient Local Lipschitz Bounds (NeurIPS, 2021).☆25Sep 4, 2022Updated 3 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Overcoming Catastrophic Forgetting by Incremental Moment Matching (IMM)☆35Dec 27, 2017Updated 8 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Robust Reinforcement Learning with the Alternating Training of Learned Adversaries (ATLA) framework☆70Jan 26, 2021Updated 5 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- [ICML'20] Multi Steepest Descent (MSD) for robustness against the union of multiple perturbation models.☆25Jul 25, 2024Updated last year
- Fork of Microsoft/LightGBM to include support for the CEGB (Cost Efficient Gradient Boosting) algorithm. Original repository at https://g…☆13Jun 30, 2017Updated 8 years ago
- A method for training neural networks that are provably robust to adversarial attacks.☆392Feb 16, 2022Updated 4 years ago
- Zeroth-order Min-max Optimization☆13Jun 28, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆99Mar 1, 2022Updated 4 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆97Jun 7, 2021Updated 4 years ago
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Jun 15, 2019Updated 6 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Code for Stability Training with Noise (STN)☆22Dec 27, 2020Updated 5 years ago