Public code for a paper "Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks."
☆35Dec 18, 2018Updated 7 years ago
Alternatives and similar repositories for lmt
Users that are interested in lmt are comparing it to the libraries listed below
Sorting:
- ☆10Aug 18, 2016Updated 9 years ago
- A method for training neural networks that are provably robust to adversarial attacks. [IJCAI 2019]☆10Sep 3, 2019Updated 6 years ago
- Scaleable input gradient regularization☆22Jul 8, 2019Updated 6 years ago
- ☆10Aug 25, 2016Updated 9 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Library for training globally-robust neural networks.☆31Aug 7, 2025Updated 6 months ago
- Measurements of Three-Level Hierarchical Structure in the Outliers in the Spectrum of Deepnet Hessians (ICML 2019)☆16Apr 27, 2019Updated 6 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- This repository contains a simple implementation of Interval Bound Propagation (IBP) using TensorFlow: https://arxiv.org/abs/1810.12715☆161Dec 20, 2019Updated 6 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- Scale Optuna with Dask☆36Oct 1, 2020Updated 5 years ago
- Simple and extensible hypergradient for PyTorch☆18Feb 23, 2023Updated 3 years ago
- Provable adversarial robustness at ImageNet scale☆406May 20, 2019Updated 6 years ago
- Variational Dropout Sparsifies Deep Neural Networks (Molchanov et al. 2017) by Chainer☆18Jun 22, 2017Updated 8 years ago
- ☆19May 25, 2023Updated 2 years ago
- Implementation of "Semi-supervised learning of hierarchical representations of molecules using neural message passing" (arXiv:1711.10168)☆14Jun 20, 2018Updated 7 years ago
- Code for the paper "Learning sparse transformations through backpropagation"☆43Dec 14, 2019Updated 6 years ago
- Release of CIFAR-10.1, a new test set for CIFAR-10.☆225Apr 16, 2020Updated 5 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆228Nov 9, 2019Updated 6 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆553Mar 30, 2023Updated 2 years ago
- ☆47Aug 15, 2019Updated 6 years ago
- Hessian spectral density estimation in TF and Jax☆125Sep 6, 2020Updated 5 years ago
- The Full Spectrum of Deepnet Hessians at Scale: Dynamics with SGD Training and Sample Size☆19May 19, 2019Updated 6 years ago
- ☆18Sep 25, 2019Updated 6 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Apr 8, 2018Updated 7 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆48Sep 16, 2019Updated 6 years ago
- Logit Pairing Methods Can Fool Gradient-Based Attacks [NeurIPS 2018 Workshop on Security in Machine Learning]☆19Dec 2, 2018Updated 7 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆22Dec 17, 2023Updated 2 years ago
- Code for the paper: Learning Adversarially Robust Representations via Worst-Case Mutual Information Maximization (https://arxiv.org/abs/2…☆23Nov 23, 2020Updated 5 years ago
- Chainer implementation of InfoGAN☆19Jul 13, 2017Updated 8 years ago
- ☆88Jul 25, 2024Updated last year
- ☆26Jul 19, 2019Updated 6 years ago
- ☆33Jul 8, 2024Updated last year
- Open source implementation of SeaRNN (ICLR 2018, https://openreview.net/forum?id=HkUR_y-RZ)☆48Jul 4, 2018Updated 7 years ago
- ☆22Jun 23, 2021Updated 4 years ago
- Interfaces for defining Robust ML models and precisely specifying the threat models under which they claim to be secure.☆62May 30, 2019Updated 6 years ago
- A method for training neural networks that are provably robust to adversarial attacks.☆391Feb 16, 2022Updated 4 years ago
- 機械学習・統計学・理論計算科学などに出てくる等式・不等式を集めていきます☆57Jun 27, 2019Updated 6 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago