Robustness for Non-Parametric Classification: A Generic Attack and Defense
☆18Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for adversarial-nonparametrics
Users that are interested in adversarial-nonparametrics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Dec 8, 2022Updated 3 years ago
- Connecting Interpretability and Robustness in Decision Trees through Separation☆17May 8, 2021Updated 4 years ago
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆20Sep 16, 2023Updated 2 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Provably Robust Boosted Decision Stumps and Trees against Adversarial Attacks [NeurIPS 2019]☆50Apr 25, 2020Updated 6 years ago
- ☆37Feb 13, 2020Updated 6 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Repository for reproducing `Model-Based Robust Deep Learning`☆17Jan 22, 2021Updated 5 years ago
- Benchmark for LP-relaxed robustness verification of ReLU-networks☆41Apr 24, 2019Updated 7 years ago
- ☆52May 24, 2023Updated 2 years ago
- Reference implementations for RecurJac, CROWN, FastLin and FastLip (Neural Network verification and robustness certification algorithms)…☆27Nov 23, 2019Updated 6 years ago
- [ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples☆69Jul 12, 2025Updated 9 months ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- [NeurIPS 2019] H. Chen*, H. Zhang*, S. Si, Y. Li, D. Boning and C.-J. Hsieh, Robustness Verification of Tree-based Models (*equal contrib…☆27Jun 15, 2019Updated 6 years ago
- Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks☆44Sep 23, 2021Updated 4 years ago
- Geometric Certifications of Neural Nets☆42Nov 22, 2022Updated 3 years ago
- Optimized Circuit Generation for Secure Multiparty Computation☆12Nov 25, 2019Updated 6 years ago
- Data Flow Matrix Machines. Generalization of recurrent neural networks.☆15Dec 24, 2024Updated last year
- ☆13Jul 9, 2018Updated 7 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- Certifying Some Distributional Robustness with Principled Adversarial Training (https://arxiv.org/abs/1710.10571)☆45May 1, 2018Updated 8 years ago
- ☆40Dec 19, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Understanding Rare Spurious Correlations in Neural Network☆12Jun 5, 2022Updated 3 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- ☆10Apr 6, 2018Updated 8 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆18Sep 16, 2025Updated 7 months ago
- ☆18Jan 14, 2020Updated 6 years ago
- Certified defense to adversarial examples using CROWN and IBP. Also includes GPU implementation of CROWN verification algorithm (in PyTor…☆97Jun 7, 2021Updated 4 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of Confidence-Calibrated Adversarial Training (CCAT).☆45Aug 3, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆16Jul 23, 2018Updated 7 years ago
- Integrating Large Circular Kernels into CNNs through Neural Architecture Search☆19Apr 9, 2022Updated 4 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 3 years ago
- Dataset and Code for our CVPR'18 paper ST-CGAN: "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detectio…☆13Apr 17, 2018Updated 8 years ago