BXuan694 / Universal-Adversarial-PerturbationView external linksLinks
This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)
☆46Apr 16, 2019Updated 6 years ago
Alternatives and similar repositories for Universal-Adversarial-Perturbation
Users that are interested in Universal-Adversarial-Perturbation are comparing it to the libraries listed below
Sorting:
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆65Nov 23, 2019Updated 6 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆53Mar 3, 2022Updated 3 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 5 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆31Jun 9, 2020Updated 5 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆37Jul 22, 2024Updated last year
- ☆14Oct 7, 2022Updated 3 years ago
- [Preprint] On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping☆10Feb 27, 2020Updated 5 years ago
- Materials for the paper https://arxiv.org/pdf/2007.15036.pdf☆14Aug 3, 2020Updated 5 years ago
- ☆18Oct 7, 2022Updated 3 years ago
- The code for the "Dynamic Backdoor Attacks Against Machine Learning Models" paper☆16Nov 20, 2023Updated 2 years ago
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated last month
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- Code for L0-ARM: Network Sparsification via Stochastic Binary Optimization☆15Oct 25, 2019Updated 6 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Official PyTorch implementation of "Multisize Dataset Condensation" (ICLR'24 Oral)☆15Apr 18, 2024Updated last year
- ☆19Jun 27, 2021Updated 4 years ago
- Code for paper: PoisonPrompt: Backdoor Attack on Prompt-based Large Language Models, IEEE ICASSP 2024. Demo//124.220.228.133:11107☆20Aug 10, 2024Updated last year
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Oct 24, 2023Updated 2 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆21Sep 8, 2021Updated 4 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆32Jan 9, 2022Updated 4 years ago
- Codes for NeurIPS 2020 paper "Adversarial Weight Perturbation Helps Robust Generalization"☆189Feb 18, 2021Updated 4 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 7 years ago
- ☆50Feb 27, 2021Updated 4 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- PyTorch implementations of the paper: "Neuron Linear Transformation: Modeling the Domain Shift for Crowd Counting. (T-NNLS, 2021)..."☆16Apr 2, 2021Updated 4 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Oct 25, 2019Updated 6 years ago
- Pytorch deep learning object detection using CINIC-10 dataset.☆22Feb 26, 2020Updated 5 years ago
- Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset☆19Apr 29, 2025Updated 9 months ago