twosixlabs / armory-exampleLinks
Example external repository for interacting with armory.
☆11Updated 3 years ago
Alternatives and similar repositories for armory-example
Users that are interested in armory-example are comparing it to the libraries listed below
Sorting:
- A unified benchmark problem for data poisoning attacks☆160Updated 2 years ago
- ☆129Updated 3 years ago
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆171Updated 4 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- ☆68Updated last year
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆449Updated last year
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆110Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆171Updated last year
- Knockoff Nets: Stealing Functionality of Black-Box Models☆110Updated 2 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆255Updated 4 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆749Updated 7 months ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 3 years ago
- ☆32Updated last year
- ☆160Updated 4 years ago
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Updated 4 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆82Updated 2 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Updated 4 years ago
- Provable adversarial robustness at ImageNet scale☆401Updated 6 years ago
- ☆54Updated 4 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Updated 2 years ago
- ☆87Updated 4 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆98Updated 3 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆724Updated last year
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212Updated 3 years ago
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆126Updated 2 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Updated 5 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆501Updated 4 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆164Updated last month