xiahaifeng1995 / adversarial-robustnessView external linksLinks
☆26Jul 18, 2019Updated 6 years ago
Alternatives and similar repositories for adversarial-robustness
Users that are interested in adversarial-robustness are comparing it to the libraries listed below
Sorting:
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- Tensorflow implementation for the ECCV20 paper "Improving Adversarial Robustness by Enforcing Local and Global Compactness"☆15Jun 13, 2021Updated 4 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- Adversarially Robust Transfer Learning with LWF loss applied to the deep feature representation (penultimate) layer☆19Feb 9, 2020Updated 6 years ago
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- ☆37Feb 13, 2020Updated 6 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆22Dec 17, 2023Updated 2 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- Source for paper "Attacking Binarized Neural Networks"☆23Mar 23, 2018Updated 7 years ago
- pytorch implementation of Parametric Noise Injection for adversarial defense☆46Oct 23, 2019Updated 6 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 7 years ago
- [CVPR 2022] Official PyTorch Implementation for "Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network"☆32Mar 13, 2023Updated 2 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 6 years ago
- Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network☆61Jun 25, 2019Updated 6 years ago
- ☆66Jun 9, 2018Updated 7 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- ☆11Oct 19, 2023Updated 2 years ago
- An R library for estimating causal effects☆12Apr 25, 2025Updated 9 months ago
- A curated list of awesome resources regarding machine learning reliability.☆31Apr 26, 2021Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Nov 22, 2022Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆14Dec 19, 2025Updated last month
- Robust Contrastive Learning Using Negative Samples with Diminished Semantics (NeurIPS 2021)☆39Dec 6, 2021Updated 4 years ago
- Python implementation of anomaly detection using the multivariate gaussian distribution☆12Sep 18, 2017Updated 8 years ago
- Fastened CROWN: Tightened Neural Network Robustness Certificates☆10Feb 10, 2020Updated 6 years ago
- Implementation of CPF clustering method.☆10May 7, 2025Updated 9 months ago
- ☆42Jan 25, 2024Updated 2 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- Implementation for Variational Information Bottleneck for Effective Low-resource Fine-tuning, ICLR 2021☆43May 10, 2021Updated 4 years ago
- ☆10Jul 24, 2023Updated 2 years ago
- ☆21Jul 8, 2025Updated 7 months ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- ☆11May 12, 2023Updated 2 years ago
- [CIKM-21] Pytorch implementation of LiteGT: Efficient and Lightweight Graph Transformers☆12Nov 16, 2021Updated 4 years ago
- Echarts get data from database. Echarts 从数据库中获取动态数据。 The project can run on both eclipse and idea.☆10Oct 18, 2017Updated 8 years ago
- https://youtu.be/pE7UOYioPKk☆10Feb 16, 2023Updated 2 years ago
- Layered distributions using FLAX/JAX☆10Dec 13, 2020Updated 5 years ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago