This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)
☆46Apr 16, 2019Updated 7 years ago
Alternatives and similar repositories for Universal-Adversarial-Perturbation
Users that are interested in Universal-Adversarial-Perturbation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆65Nov 23, 2019Updated 6 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆52Mar 3, 2022Updated 4 years ago
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆249Jan 12, 2019Updated 7 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆32Jun 9, 2020Updated 5 years ago
- [CVPR 2018] Tensorflow implementation of NAG : Network for Adversary Generation☆33May 24, 2018Updated 7 years ago
- Input-aware Dynamic Backdoor Attack (NeurIPS 2020)☆39Jul 22, 2024Updated last year
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- ☆14Oct 21, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆23Apr 30, 2024Updated last year
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆14Oct 7, 2022Updated 3 years ago
- ☆19Jun 21, 2021Updated 4 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- ☆29Jul 26, 2021Updated 4 years ago
- Materials for the paper https://arxiv.org/pdf/2007.15036.pdf☆14Aug 3, 2020Updated 5 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Jun 29, 2020Updated 5 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆23Sep 8, 2021Updated 4 years ago
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆74Apr 12, 2018Updated 8 years ago
- Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset☆19Apr 29, 2025Updated 11 months ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PyTorch implementations of the paper: "Neuron Linear Transformation: Modeling the Domain Shift for Crowd Counting. (T-NNLS, 2021)..."☆16Apr 2, 2021Updated 5 years ago
- Implementation for ACProp ( Momentum centering and asynchronous update for adaptive gradient methdos, NeurIPS 2021)☆16Oct 11, 2021Updated 4 years ago
- In the context of Deep Learning: What is the right way to conduct example weighting? How do you understand loss functions and so-called …☆10Mar 4, 2021Updated 5 years ago
- ☆51Feb 27, 2021Updated 5 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆45Oct 24, 2023Updated 2 years ago
- Sampling and visualising the von Mises-Fisher distribution. An important hyper-spherical distribution.☆15Jun 5, 2020Updated 5 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago