Example code of [Tianchi AAAI2022 Security AI Challenger Program Phase 8]
☆22Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for training_template_for_AI_challenger_sea8
Users that are interested in training_template_for_AI_challenger_sea8 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- code for our BMVC 2021 paper "HCV: Hierarchy-Consistency Verification for Incremental Implicitly-Refined Classification"☆15Oct 28, 2022Updated 3 years ago
- The repo for paper: Exploiting the Index Gradients for Optimization-Based Jailbreaking on Large Language Models.☆14Dec 16, 2024Updated last year
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 5 years ago
- Code for NeurIPS 2024 Paper "Fight Back Against Jailbreaking via Prompt Adversarial Tuning"☆22May 6, 2025Updated last year
- ☆10Oct 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Jan 25, 2018Updated 8 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- [ACL 2023] Delving into the Openness of CLIP☆24Jan 11, 2023Updated 3 years ago
- this is commonProject web Manage.基于Spring boot + mybatis的commonProject后端☆10Jul 20, 2023Updated 2 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Code for ICLR 2025 Failures to Find Transferable Image Jailbreaks Between Vision-Language Models☆36Jun 1, 2025Updated 11 months ago
- LED : Light Enhanced Depth Estimation at Night☆15Mar 24, 2026Updated last month
- ☆14Jul 13, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- A "gym" style toolkit for building lightweight NAS systems.☆13Jun 13, 2022Updated 3 years ago
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- object detection; robust detection; ACM MM21 grand challenge; Security AI Challenger Phase VII☆77Oct 24, 2021Updated 4 years ago
- [NeurIPS 2024] Accelerating Greedy Coordinate Gradient and General Prompt Optimization via Probe Sampling☆35Nov 8, 2024Updated last year
- A Framework for Evaluating AI Agent Safety in Realistic Environments☆35Oct 2, 2025Updated 7 months ago
- Fine-tuning base models to build robust task-specific models☆35Apr 11, 2024Updated 2 years ago
- OVAL framework for BaB-based Neural Network Verification☆17May 8, 2026Updated last week
- Playing around with various jailbreaking techniques ahead of the Gray Swan AI Ultimate Jailbreaking Competition☆18Oct 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [TMLR 2025] Official implementation of AttnGCG: Enhancing Jailbreaking Attacks on LLMs with Attention Manipulation☆26Jun 17, 2025Updated 11 months ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆37Apr 8, 2026Updated last month
- Code for the ICML 2021 paper "Sharing Less is More: Lifelong Learning in Deep Networks with Selective Layer Transfer"☆12Aug 17, 2021Updated 4 years ago
- ☆12May 6, 2022Updated 4 years ago
- A small PDF Reader based on mupdf for your handwriting.☆12Sep 23, 2021Updated 4 years ago
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- nice little engine - tiny 3d game engine.☆11Sep 15, 2024Updated last year
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tutorial by Vito Walter Anelli, Yashar Deldjoo, Tommaso Di Noia and Felice Antonio Merra about Adversarial Machine Learning in Recommende…☆25Apr 12, 2021Updated 5 years ago
- ☆10Jul 11, 2022Updated 3 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Dec 23, 2020Updated 5 years ago
- NeurIPS 2021 - Few-shot learning competition☆26Sep 27, 2021Updated 4 years ago
- An efficient multi-modal instruction-following data synthesis tool and the official implementation of Oasis https://arxiv.org/abs/2503.08…☆40Jun 4, 2025Updated 11 months ago
- update code for pytorch1.4☆11Aug 12, 2021Updated 4 years ago
- ☆13Jan 5, 2022Updated 4 years ago