PGD adversarial training in PyTorch
☆13Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-training
Users that are interested in Adversarial-training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- ☆21Mar 30, 2022Updated 4 years ago
- ☆12Feb 19, 2025Updated last year
- Reproduce Paper "Federated Learning with Non-IID Data"☆10May 3, 2021Updated 4 years ago
- Source Code Search☆11Nov 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- ☆14Dec 12, 2023Updated 2 years ago
- Backdooring Neural Code Search☆14Sep 8, 2023Updated 2 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- Unsupervised Graph Poisoning Attack via Contrastive Loss Back-propagation, WWW22☆17Jun 30, 2022Updated 3 years ago
- Official implementation of Panacea: A foundation model for clinical trial design, recruitment, search, and summarization.☆18Dec 24, 2024Updated last year
- [NeurIPS 2021 | AIJ 2024] Multi-Objective Meta Learning☆17Jul 31, 2024Updated last year
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆12Oct 17, 2024Updated last year
- FDFO: Finite Difference Flow Optimization☆66Mar 16, 2026Updated 2 weeks ago
- On the Robustness of GUI Grounding Models Against Image Attacks☆12Apr 8, 2025Updated 11 months ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- A toolbox for backdoor attacks.☆23Jan 13, 2023Updated 3 years ago
- ☆10Jan 18, 2024Updated 2 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆22Sep 17, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆28Sep 11, 2024Updated last year
- SuperGS: Super-Resolution 3D Gaussian Splatting Enhanced by Variational Residual Features and Uncertainty-Augmented Learning☆11May 24, 2025Updated 10 months ago
- ☆17Jan 19, 2019Updated 7 years ago
- ☆22Mar 2, 2022Updated 4 years ago
- StyleSwin: Transformer-based GAN for High-resolution Image Generation☆11Dec 21, 2021Updated 4 years ago
- Official code for the paper "Membership Inference Attacks Against Recommender Systems" (ACM CCS 2021)☆21Oct 8, 2024Updated last year
- Cambridge Arboreal Modelling Panoptic 3D: Pipeline and Dataset☆25Sep 16, 2025Updated 6 months ago
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- Disrupting Diffusion: Token-Level Attention Erasure Attack against Diffusion-based Customization(ACM MM2024)☆18Mar 31, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RESAnything: Attribute Prompting for Arbitrary Referring Segmentation☆17Nov 28, 2025Updated 4 months ago
- This repo illustrates how to evaluate the artifacts in the paper An Extensive Study on Pre-trained Models for Program Understanding and G…☆27Aug 12, 2022Updated 3 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- A geometric deep learning method for refining and assessing protein complex structures.☆16Oct 22, 2022Updated 3 years ago
- ☆14Dec 31, 2024Updated last year
- UI框架。包含Bmob后台实现的登录注册,TabHost和DrawerLayout的布局,以及Fragment和ViewPager的复用,内置页包含了一些简单网络请求方法和请求库okhttp。Tab中调用的API有手机号码归属地查询,天气预报,成语字典等。以及自定义Dial…☆20Jan 22, 2016Updated 10 years ago
- [ICLR24] Better Neural PDE Solvers Through Data-Free Mesh Movers☆17Mar 20, 2024Updated 2 years ago