AmineDiro / Adversarial-Attacks
FGSM and L-BFG implementation
☆14Updated 3 years ago
Alternatives and similar repositories for Adversarial-Attacks:
Users that are interested in Adversarial-Attacks are comparing it to the libraries listed below
- Transformer based Translation model☆10Updated 3 years ago
- ☆131Updated 3 years ago
- Learn the theory, math and code behind different machine learning algorithms and techniques.☆69Updated 2 years ago
- Scripts and Approach for Amazon ML Challenge☆88Updated 3 years ago
- This repositary contain all my exercises and projects of Udacity Computer Vision Nanodegree Program☆53Updated last year
- Coursera Generative Adversarial Networks (GANs) Specialization☆45Updated last year
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆204Updated last month
- Demonstrates knowledge distillation for image-based models in Keras.☆52Updated 3 years ago
- ☆19Updated 4 years ago
- Decision tree implementation from scratch☆56Updated 2 years ago
- Brown University DSI DATA2040 Final Project☆28Updated 2 years ago
- A multi-functional library for full-stack Deep Learning. Simplifies Model Building, API development, and Model Deployment.☆225Updated last week
- Implementation of the paper on Fast Super Resolution CNN☆39Updated 3 years ago
- 30 Days GANs Paper Reading☆45Updated last year
- Ready-to-use implementations of some of the most common computer vision algorithms☆32Updated 3 years ago
- A Python library for Secure and Explainable Machine Learning☆162Updated 2 months ago
- Protect your machine learning models easily and securely with watermarking 🔑☆93Updated 8 months ago
- Experiments on MNIST dataset and federated training using Flower framework☆35Updated 6 months ago
- Vision architectures implemented in Pytorch☆8Updated 3 years ago
- Serving PyTorch models with TorchServe☆101Updated last year
- Repository to perform simple pruning experiments on neural networks☆17Updated 4 years ago
- ☆16Updated last year
- [ACL24] Official Repo of Paper `ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs`☆53Updated last month
- This code is intended to merge multiple jupyter notebooks into one notebook. final notebook will also contain the parent file names☆25Updated last year
- Contains materials for workshops pertaining to adversarial robustness in deep learning.☆86Updated 3 years ago
- ☆8Updated 2 years ago
- Serving TensorFlow models with TensorFlow Serving☆44Updated 2 years ago
- Implementation of reinforcement learning algorithms in a cyber security simulation. Autonomous and Adaptive Systems (University of Bologn…☆8Updated 4 years ago
- Functions and util functions that I use☆13Updated 3 years ago
- Tensorflow implementation of the Vision Transformer (An Image is Worth 16x16 Words: Transformer☆98Updated 4 years ago