Official implementation from Papers with Code · Repository link is mentioned in the paper metadata
- Stars
- 741
- Last push
- May 16, 2024 (700d ago)
Risk flags
- No push in 12+ months
- No CI pipeline detected
- No tagged releases
Jiequan Cui, Shu Liu, Liwei Wang, Jiaya Jia
Paper appears method- or tooling-adjacent to AI workflows with partial ecosystem coverage.
Previous adversarial training raises model robustness under the compromise of accuracy on natural data. In this paper, we reduce natural accuracy degradation. We use the model logits from one clean model to guide learning of another one robust model, taking into consideration that logits from the well trained clean model embed the most discriminative features of natural data, {\it e.g.}, generalizable classifier boun ...
dary. Our solution is to constrain logits from the robust model that takes adversarial examples as input and makes it similar to those from the clean model fed with corresponding natural data. It lets the robust model inherit the classifier boundary of the clean model. Moreover, we observe such boundary guidance can not only preserve high natural accuracy but also benefit model robustness, which gives new insights and facilitates progress for the adversarial community. Finally, extensive experiments on CIFAR-10, CIFAR-100, and Tiny ImageNet testify to the effectiveness of our method. We achieve new state-of-the-art robustness on CIFAR-100 without additional real or synthetic data with auto-attack benchmark \footnote{\url{https://github.com/fra31/auto-attack}}. Our code is available at \url{https://github.com/dvlab-research/LBGAT}.
Some benchmark signal exists in the extracted evidence, but it is not structured strongly enough yet for a confident benchmark decision.
Previous adversarial training raises model robustness under the compromise of accuracy on natural data.
fra31/auto-attack is the strongest maintained implementation based on ranking signals. License is declared (MIT).
Open fra31/auto-attackHardware Notes
Expect multi-day setup/compute for meaningful reproduction based on current guidance.
Evidence graph: 4 refs, 4 links.
Utility signals: depth 85/100, grounding 85/100, status high.
Compare maintenance quality, reproducibility coverage, and evidence confidence before choosing a reproduction baseline.
Official implementation from Papers with Code · Repository link is mentioned in the paper metadata
Risk flags
Official implementation from Papers with Code · Repository link is mentioned in the paper metadata
Risk flags
Official implementation from Papers with Code · Strong overlap with paper title keywords
Risk flags
Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"
Preserved for provenance. Not recommended as the default path for new builds.
Hardware requirements
No dependency manifest — manual reconstruction required
Learnable Boundary Guided Adversarial Training (ICCV2021)
Learnable Boundary Guided Adversarial Training (ICCV2021)
These repositories had low-confidence matching signals and are hidden by default.
No direct paper-linked artifacts were found. Showing strongest curated related artifacts for faster exploration.
Broaden model search
No trustworthy dataset matches right now.
Search datasets on Hugging FaceNo trustworthy demo spaces right now.
Search spaces on Hugging FaceTasks
Image classification
Methods
None detected
Domains
Computer vision
Evaluation & Human Feedback Data
Open this paper in HFEPX to review benchmark signals, evaluation modes, and human-feedback protocol context.
Open in HFEPXExplore Similar Papers
Jump to Paper2Code search queries derived from this paper's research context.
Need human evaluators for your AI research? Scale annotation with expert AI Trainers.