zhangao520 / defense-vgaeLinks
DefenseVGAE
☆7Updated 5 years ago
Alternatives and similar repositories for defense-vgae
Users that are interested in defense-vgae are comparing it to the libraries listed below
Sorting:
- A general method for training cost-sensitive robust classifier☆22Updated 6 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆19Updated 6 years ago
- ☆22Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Updated 8 years ago
- ☆18Updated 3 years ago
- [AAAI'21] Modeling Deep Learning Based Privacy Attacks on Physical Mail☆13Updated 4 years ago
- 👿→😈☆24Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆40Updated 6 years ago
- A library of techniques for local interpretation of machine learning models☆9Updated 2 years ago
- Implementation for What it Thinks is Important is Important: Robustness Transfers through Input Gradients (CVPR 2020 Oral)☆16Updated 2 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆22Updated 6 years ago
- Caffe code for the paper "Adversarial Manipulation of Deep Representations"☆17Updated 7 years ago
- PyTorch code for KDD 18 paper: Towards Explanation of DNN-based Prediction with Guided Feature Inversion☆21Updated 6 years ago
- A statistical framework for graph anomaly detection.☆17Updated 6 years ago
- Deep Graph Kernels☆13Updated 9 years ago
- ☆10Updated 7 years ago
- Statitical Anomaly Detector of Internet Traffic (SADIT)☆22Updated 8 years ago
- Official codebase of our paper "Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Network For Secure Inferen…☆15Updated 2 years ago
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 3 years ago
- ☆12Updated 4 years ago
- Implementation of the LOSSGRAD optimization algorithm☆15Updated 6 years ago
- Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".☆20Updated 5 years ago
- Implementation of Deep Soft-K means☆28Updated 4 years ago
- ☆11Updated 3 years ago
- ☆15Updated 8 years ago
- ☆11Updated 5 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆11Updated 11 months ago
- Circumventing the defense in "Ensemble Adversarial Training: Attacks and Defenses"☆38Updated 7 years ago
- load vgg-face pre-trained caffe model using pytorch☆18Updated 7 years ago
- Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks in Keras.☆21Updated 6 years ago