This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)
☆46Apr 16, 2019Updated 6 years ago
Alternatives and similar repositories for Universal-Adversarial-Perturbation
Users that are interested in Universal-Adversarial-Perturbation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆65Nov 23, 2019Updated 6 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆52Mar 3, 2022Updated 4 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- ☆248Jan 12, 2019Updated 7 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆31Jun 9, 2020Updated 5 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆38Jul 22, 2024Updated last year
- Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"☆188Feb 18, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆23Apr 30, 2024Updated last year
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Code for L0-ARM: Network Sparsification via Stochastic Binary Optimization☆15Oct 25, 2019Updated 6 years ago
- ☆14Oct 7, 2022Updated 3 years ago
- Code for the paper "Leveraging Self-Supervision for Cross-Domain Crowd Counting"(CVPR 2022)☆14May 4, 2022Updated 3 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 5 years ago
- Materials for the paper https://arxiv.org/pdf/2007.15036.pdf☆14Aug 3, 2020Updated 5 years ago
- ☆12Mar 29, 2021Updated 5 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- ☆10Jun 29, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 应用在光学4f系统中的压缩感 知算法。光学系统用于图像的传输通信,压缩感知算法在其中做图像加密。☆12Aug 17, 2019Updated 6 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆22Sep 8, 2021Updated 4 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset☆19Apr 29, 2025Updated 11 months ago