Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".
☆13Sep 11, 2020Updated 5 years ago
Alternatives and similar repositories for whoneedsadversaries
Users that are interested in whoneedsadversaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active attention in classification networks that is optimised at the time of model training.☆11Nov 9, 2018Updated 7 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆73Jun 1, 2024Updated last year
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Source code of "Hold me tight! Influence of discriminative features on deep network boundaries"☆21Dec 10, 2021Updated 4 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Learning Robust Global Representations by Penalizing Local Predictive Power (NeurIPS 2019))☆18Nov 21, 2022Updated 3 years ago
- An Investigation of Why Overparameterization Exacerbates Spurious Correlations☆30Jul 12, 2020Updated 5 years ago
- Implementation of LDMnet in pytorch☆22Nov 9, 2018Updated 7 years ago
- Straight To Shapes: Real-Time Detection of Encoded Shapes☆35Aug 30, 2017Updated 8 years ago
- Code for paper "Not All Unlabeled Data are Equal: Learning to Weight Data in Semi-supervised Learning", Ren et al., NeurIPS'20☆25Jan 10, 2021Updated 5 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆90Mar 24, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆12Nov 5, 2019Updated 6 years ago
- Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes☆23Jun 14, 2020Updated 5 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Aug 8, 2019Updated 6 years ago
- Code for the paper "Addressing Model Vulnerability to Distributional Shifts over Image Transformation Sets", ICCV 2019☆27Mar 17, 2020Updated 6 years ago
- Learning perturbation sets for robust machine learning☆64Aug 23, 2021Updated 4 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Fine-grained ImageNet annotations☆30May 25, 2020Updated 5 years ago
- Code for the CVPR 2021 paper: Understanding Failures of Deep Networks via Robust Feature Extraction☆36May 29, 2022Updated 3 years ago
- GProM is a middleware that adds support for provenance to database backends.☆10Mar 22, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Semisupervised learning for adversarial robustness https://arxiv.org/pdf/1905.13736.pdf☆140Mar 30, 2020Updated 5 years ago
- Conditional Mutual Informaation Neural Estimator☆14Oct 23, 2020Updated 5 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- ☆13Nov 26, 2021Updated 4 years ago
- ☆13Jul 25, 2024Updated last year
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- ☆143Oct 2, 2020Updated 5 years ago
- ☆35Dec 9, 2020Updated 5 years ago
- Adversarial Defense for Ensemble Models (ICML 2019)☆61Nov 28, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Oct 29, 2021Updated 4 years ago
- Improving the Generalization of Adversarial Training with Domain Adaptation☆33Feb 25, 2019Updated 7 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Monocular Depth Estimation using Atrous Convolutions☆11Apr 5, 2019Updated 6 years ago
- Source code for the paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness"☆25Feb 12, 2020Updated 6 years ago
- Two-stage routing with Optimized Guided search and Greedy algorithm☆10Sep 27, 2023Updated 2 years ago
- The code for Generative Locally Linear Embedding (GLLE).☆13Nov 4, 2021Updated 4 years ago