☆18Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for scaling_camouflage
Users that are interested in scaling_camouflage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 10 months ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 6 months ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An Automatic DNN TrainingProblem Detection and Repair System☆20Dec 23, 2023Updated 2 years ago
- A program that tracks the ball and estimates the shot location of a basketball shot.☆11May 21, 2019Updated 6 years ago
- [AAAI 2024] DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models☆12Dec 5, 2024Updated last year
- Official repository for the paper "Gradient-based Jailbreak Images for Multimodal Fusion Models" (https//arxiv.org/abs/2410.03489)☆19Oct 22, 2024Updated last year
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- [NeurIPS 2024] Fight Back Against Jailbreaking via Prompt Adversarial Tuning☆11Oct 29, 2024Updated last year
- source code for paper "Unsupervised Hashing with Contrastive Information Bottleneck" published in IJCAI 2021☆40Apr 18, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- List of papers on cryptography assisted deep learning privacy computation☆18Apr 1, 2026Updated 2 weeks ago
- Learning from Noisy Anchors for One-stage Object Detection☆27Apr 14, 2021Updated 5 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Official codes for FPR (Accepted by CVPR2025)☆14Mar 19, 2025Updated last year
- Adversarial Item Promotion in visually-aware recommenders☆17Sep 3, 2021Updated 4 years ago
- Code for the paper "Evading Black-box Classifiers Without Breaking Eggs" [SaTML 2024]☆21Apr 15, 2024Updated 2 years ago
- ☆20Oct 28, 2025Updated 5 months ago
- 😎 A curated list of awesome real-world adversarial examples resources☆63Jul 29, 2020Updated 5 years ago
- ☆11Oct 2, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Feb 12, 2025Updated last year
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- T-GD: Transferable GAN-generated Images Detection Framework. (ICML 2020)☆18May 12, 2021Updated 4 years ago
- ☆27Mar 16, 2025Updated last year
- Code for the paper: Graph Jigsaw Learning for Cartoon Face Recognition☆10Jul 1, 2022Updated 3 years ago
- Adult Image Classification by a local-context aware network☆18Jan 11, 2018Updated 8 years ago
- Official code for the paper "Adversarial Magnification to Deceive Deepfake Detection through Super Resolution"☆12Jun 26, 2023Updated 2 years ago
- Official repo for the paper "Make Some Noise: Reliable and Efficient Single-Step Adversarial Training" (https://arxiv.org/abs/2202.01181)☆25Oct 17, 2022Updated 3 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- low-pass filtering for image implemented by pytorch, including ideal, butterworth and gaussian filters.☆22May 19, 2025Updated 11 months ago
- ☆13Jan 25, 2025Updated last year
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- [CVPR2020] Clean-Label Backdoor Attacks on Video Recognition Models☆41Jun 19, 2020Updated 5 years ago
- This repo contains my part of the code for our winning entry in the TensorFlow Speech Recognition Challenge hosted by kaggle☆19Aug 27, 2018Updated 7 years ago
- The code implementation of the paper CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Low Resource With Contrastive Learni…☆16Mar 26, 2024Updated 2 years ago