☆26Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for adversarial-robustness
Users that are interested in adversarial-robustness are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial attack methods, FGSM and TGSM, implemented in Chainer☆15Jul 7, 2017Updated 8 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Tensorflow implementation for the ECCV20 paper "Improving Adversarial Robustness by Enforcing Local and Global Compactness"☆15Jun 13, 2021Updated 4 years ago
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Source for paper "Attacking Binarized Neural Networks"☆23Mar 23, 2018Updated 8 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆18Nov 10, 2020Updated 5 years ago
- ☆37Feb 13, 2020Updated 6 years ago
- pytorch implementation of Parametric Noise Injection for adversarial defense☆46Oct 23, 2019Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆61Jun 25, 2019Updated 6 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Robust Contrastive Learning Using Negative Samples with Diminished Semantics (NeurIPS 2021)☆40Dec 6, 2021Updated 4 years ago
- ACL 2021: HiTransformer☆13May 29, 2021Updated 4 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆22Dec 17, 2023Updated 2 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Video retrieval from query images☆11Oct 10, 2017Updated 8 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [ICLR 2025] Adaptive prompt tailored pruning of T2I diffusion models.☆15Feb 1, 2025Updated last year
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- Zeroth-order Min-max Optimization☆13Jun 28, 2020Updated 5 years ago
- Code for Learned Thresholds Token Merging and Pruning for Vision Transformers (LTMP). A technique to reduce the size of Vision Transforme…☆17Nov 24, 2024Updated last year
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 6 months ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Learning to share: simultaneous parameter tying and sparsification in deep learning☆13Aug 21, 2018Updated 7 years ago
- A basic education user interface for learning Chinese and practice Chinese handwriting. Sketch recognition techniques were utilized to re…☆15Sep 16, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My solutions for the programming contest website Kattis : open.kattis.com : If you have any questions about the reasoning behind a proble…☆10May 6, 2024Updated last year
- Pytorch implementation of HCNAF: Hyper-Conditioned Neural Autoregressive Flow (CVPR 2020)☆15Jun 14, 2020Updated 5 years ago
- Gamma Belief Networks☆12Mar 2, 2018Updated 8 years ago
- ☆14Oct 16, 2021Updated 4 years ago
- This repo is an implementation of quantized CNN for both weights (1-bit compression) and feature maps (2-bit compression).☆18Aug 22, 2018Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago