☆15Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for bilateral-adversarial-training
Users that are interested in bilateral-adversarial-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Feature Scattering Adversarial Training (NeurIPS19)☆73Jun 1, 2024Updated last year
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Dec 26, 2019Updated 6 years ago
- Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)☆22Dec 30, 2019Updated 6 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- code for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆16Dec 8, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- ☆25Jun 17, 2025Updated 9 months ago
- ☆26Jan 25, 2019Updated 7 years ago
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- Smooth Adversarial Training☆68Nov 16, 2020Updated 5 years ago
- Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"☆188Feb 18, 2021Updated 5 years ago
- ☆20Sep 13, 2021Updated 4 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Code for the NeurIPS 2019 submission: "Improving Black-box Adversarial Attacks with a Transfer-based Prior".☆15May 6, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- Host CIFAR-10.2 Data Set☆13Sep 22, 2021Updated 4 years ago
- Code for the paper Adversarial Robustness via Adversarial Label-Smoothing☆11Feb 5, 2020Updated 6 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- [ICLR 2021] "Robust Overfitting may be mitigated by properly learned smoothening" by Tianlong Chen*, Zhenyu Zhang*, Sijia Liu, Shiyu Chan…☆49Dec 30, 2021Updated 4 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆66Aug 8, 2019Updated 6 years ago
- ☆13Jul 11, 2019Updated 6 years ago
- ☆12Aug 8, 2023Updated 2 years ago
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆39Dec 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Github for the conference paper GLOD-Gaussian Likelihood OOD detector☆16Apr 18, 2022Updated 3 years ago
- A fast and efficient way to compute a differentiable bound on the singular values of convolution layers☆12Nov 22, 2019Updated 6 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Low-variance, efficient and unbiased gradient estimation for optimizing models with binary latent variables. (ICLR 2019)☆27Mar 9, 2019Updated 7 years ago
- white box adversarial attack☆36Jan 30, 2021Updated 5 years ago
- ☆21Nov 19, 2021Updated 4 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆47Sep 16, 2019Updated 6 years ago
- Official PyTorch implementation of CVPR2022 paper “Learning to Imagine: Diversify Memory for Incremental Learning using Unlabeled Data”☆13Jul 25, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Code for the paper "SmoothMix: Training Confidence-calibrated Smoothed Classifiers for Certified Robustness" (NeurIPS 2021)☆21Sep 27, 2022Updated 3 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆15Nov 27, 2023Updated 2 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- Empirical tricks for training robust models (ICLR 2021)☆256May 25, 2023Updated 2 years ago
- ☆14Jul 2, 2024Updated last year