zzd1992 / Adversarial-Defense-by-Suppressing-High-FrequenciesView external linksLinks
An efficient adversarial defense method with strong insights which won the fifth place of the IJCAI-2019 Alibaba Adversarial AI Challenge.
☆12Oct 25, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-Defense-by-Suppressing-High-Frequencies
Users that are interested in Adversarial-Defense-by-Suppressing-High-Frequencies are comparing it to the libraries listed below
Sorting:
- Improving the Generalization of Adversarial Training with Domain Adaptation☆33Feb 25, 2019Updated 6 years ago
- Towards Achieving Adversarial Robustness by Enforcing Feature Consistency Across Bit Planes☆23Jun 14, 2020Updated 5 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Unofficial implementation of the paper 'Adversarial Training for Free'☆23May 8, 2019Updated 6 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- Ensemble Adversarial Training on MNIST with pytorch☆20Apr 17, 2019Updated 6 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago
- ☆20Jun 10, 2020Updated 5 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- Self-hosted Todolist app written in Python☆10Apr 16, 2021Updated 4 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆137Nov 25, 2020Updated 5 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- Lightweight Neural Architecture Search for Temporal Convolutional Networks at the Edge☆10Mar 6, 2023Updated 2 years ago
- Code for reproducing the results from "CrAM: A Compression-Aware Minimizer" accepted at ICLR 2023☆10Mar 1, 2023Updated 2 years ago
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- ☆162Feb 26, 2021Updated 4 years ago
- Several state-of-the-arts RDH schemes for JPEG images implemented by me.☆10Jun 2, 2020Updated 5 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- HFMF: Hierarchical Fusion Meets Multi-Stream Models for Deepfake Detection☆13Jan 6, 2025Updated last year
- Minimum viable code for the Decodable Information Bottleneck paper. Pytorch Implementation.☆11Oct 20, 2020Updated 5 years ago
- 📲 Selfhosted RSS Podcast Feeds for Youtube channels.☆12Mar 15, 2018Updated 7 years ago
- Dockerized cross-compilation for the Bela platform☆13May 24, 2020Updated 5 years ago
- ☆13Jul 14, 2025Updated 7 months ago
- Implementation of "POPCORN: Partially Observed Prediction Constrained Reinforcement Learning" (Futoma, Hughes, Doshi-Velez, AISTATS 2020)☆11May 19, 2021Updated 4 years ago
- Learn from amazing Kagglers on Kaggle☆12Feb 26, 2023Updated 2 years ago
- Fuzzy DQN in Keras☆10Jan 6, 2021Updated 5 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆504Aug 30, 2021Updated 4 years ago
- Code for "Learning Perceptually-Aligned Representations via Adversarial Robustness"☆164Mar 19, 2020Updated 5 years ago
- white box adversarial attack☆37Jan 30, 2021Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- Repository for code\data sharing of the paper entitled ‘Intelligent Parameter Tuning in Optimization-based Iterative CT Reconstruction vi…☆11May 2, 2018Updated 7 years ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago