twosixlabs / armory-exampleLinks
Example external repository for interacting with armory.
☆11Updated 3 years ago
Alternatives and similar repositories for armory-example
Users that are interested in armory-example are comparing it to the libraries listed below
Sorting:
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆448Updated last year
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆170Updated 4 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆186Updated last year
- A unified benchmark problem for data poisoning attacks☆159Updated 2 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- ☆129Updated 3 years ago
- ☆23Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- ☆67Updated last year
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆717Updated last year
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆170Updated last year
- Knockoff Nets: Stealing Functionality of Black-Box Models☆108Updated 2 years ago
- ☆158Updated 4 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 3 years ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆110Updated last year
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆126Updated 2 years ago
- ☆86Updated 4 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆151Updated 5 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆500Updated 4 years ago
- ☆53Updated 3 years ago
- Unofficial implementation of the DeepMind papers "Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples…☆98Updated 3 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆163Updated 2 weeks ago
- ☆41Updated last year
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Updated 6 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆168Updated 5 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 2 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆746Updated 6 months ago
- A paper list for localized adversarial patch research☆157Updated 2 months ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Updated 4 years ago
- PyTorch Implementation of Adversarial Training for Free!☆248Updated 4 years ago