twosixlabs / armory-exampleLinks
Example external repository for interacting with armory.
☆11Updated 3 years ago
Alternatives and similar repositories for armory-example
Users that are interested in armory-example are comparing it to the libraries listed below
Sorting:
- A unified benchmark problem for data poisoning attacks☆157Updated last year
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆445Updated last year
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆169Updated 4 years ago
- ☆128Updated 3 years ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆183Updated last year
- Provable adversarial robustness at ImageNet scale☆396Updated 6 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Updated 2 years ago
- [ICLR2021] Unlearnable Examples: Making Personal Data Unexploitable☆170Updated last year
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Updated 4 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆500Updated 4 years ago
- ☆157Updated 4 years ago
- Attacks Which Do Not Kill Training Make Adversarial Learning Stronger (ICML2020 Paper)☆125Updated last year
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆735Updated 5 months ago
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching☆108Updated last year
- Code for "Neural Tangent Generalization Attacks" (ICML 2021)☆41Updated 4 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆106Updated 2 years ago
- ☆66Updated last year
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆36Updated 5 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆716Updated last year
- Library containing PyTorch implementations of various adversarial attacks and resources☆161Updated last week
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Updated 4 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆255Updated 4 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆55Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 3 years ago
- ☆85Updated 4 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆543Updated 2 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆151Updated 4 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆166Updated 5 years ago