All Projects → Flag-C → ThermometerEncoding

Flag-C / ThermometerEncoding

Licence: other
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch

Programming Languages

python
139335 projects - #7 most used programming language
Jupyter Notebook
11667 projects

Projects that are alternatives of or similar to ThermometerEncoding

synthesizing-robust-adversarial-examples
My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-AW
Stars: ✭ 60 (+300%)
Mutual labels:  adversarial-machine-learning, adversarial-example
EAD Attack
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Stars: ✭ 34 (+126.67%)
Mutual labels:  adversarial-machine-learning
AdverseDrive
Attacking Vision based Perception in End-to-end Autonomous Driving Models
Stars: ✭ 24 (+60%)
Mutual labels:  adversarial-machine-learning
backdoors101
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Stars: ✭ 181 (+1106.67%)
Mutual labels:  adversarial-machine-learning
adversarial-code-generation
Source code for the ICLR 2021 work "Generating Adversarial Computer Programs using Optimized Obfuscations"
Stars: ✭ 16 (+6.67%)
Mutual labels:  adversarial-machine-learning
AMR
This is our official implementation for the paper: Jinhui Tang, Xiaoyu Du, Xiangnan He, Fajie Yuan, Qi Tian, and Tat-Seng Chua, Adversarial Training Towards Robust Multimedia Recommender System.
Stars: ✭ 30 (+100%)
Mutual labels:  adversarial-machine-learning
Adversarial-Patch-Training
Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.
Stars: ✭ 30 (+100%)
Mutual labels:  adversarial-machine-learning
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+446.67%)
Mutual labels:  adversarial-machine-learning
Adversarial Robustness Toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+17486.67%)
Mutual labels:  adversarial-machine-learning
awesome-machine-learning-reliability
A curated list of awesome resources regarding machine learning reliability.
Stars: ✭ 31 (+106.67%)
Mutual labels:  adversarial-machine-learning
tulip
Scaleable input gradient regularization
Stars: ✭ 19 (+26.67%)
Mutual labels:  adversarial-machine-learning
translearn
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
Stars: ✭ 18 (+20%)
Mutual labels:  adversarial-machine-learning
advrank
Adversarial Ranking Attack and Defense, ECCV, 2020.
Stars: ✭ 19 (+26.67%)
Mutual labels:  adversarial-machine-learning
adversarial-recommender-systems-survey
The goal of this survey is two-fold: (i) to present recent advances on adversarial machine learning (AML) for the security of RS (i.e., attacking and defense recommendation models), (ii) to show another successful application of AML in generative adversarial networks (GANs) for generative applications, thanks to their ability for learning (high-…
Stars: ✭ 110 (+633.33%)
Mutual labels:  adversarial-machine-learning
robust-local-lipschitz
A Closer Look at Accuracy vs. Robustness
Stars: ✭ 75 (+400%)
Mutual labels:  adversarial-machine-learning
procedural-advml
Task-agnostic universal black-box attacks on computer vision neural network via procedural noise (CCS'19)
Stars: ✭ 47 (+213.33%)
Mutual labels:  adversarial-machine-learning
Adversarial-Distributional-Training
Adversarial Distributional Training (NeurIPS 2020)
Stars: ✭ 52 (+246.67%)
Mutual labels:  adversarial-machine-learning
athena
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Stars: ✭ 39 (+160%)
Mutual labels:  adversarial-machine-learning
perceptron-benchmark
Robustness benchmark for DNN models.
Stars: ✭ 61 (+306.67%)
Mutual labels:  adversarial-machine-learning
Fawkes
Fawkes, privacy preserving tool against facial recognition systems. More info at https://sandlab.cs.uchicago.edu/fawkes
Stars: ✭ 4,362 (+28980%)
Mutual labels:  adversarial-machine-learning

ThermometerEncoding

This is a repo trying to reproduce Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch.

Results on CIFAR10

I use ResNet-50 to reproduce the experiment instead of a Wide-ResNet. All LS-PGA attack is 7-step iterative white-box attack. However, I find that if I increase the attack step-size, attack failure rate will drop dramatically.

clean LS-PGA $$\xi=0.01$$ LS-PGA $$\xi=0.1$$ LS-PGA $$\xi=1$$ results on the paper(LS-PGA) results on the paper(clean)
clean trained 91.52% 43.27% 3.14% 0.12% 50.50% 94.22%
adv trained 89.75% 74.00% 27.44% 15.02% 79.16% 89.88%
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].