Bhushan-Jagtap-2013 / Adversarial_Attack_on_RNNView external linksLinks
Performing C&W attack on Recurrent Neural Network
☆12Sep 26, 2018Updated 7 years ago
Alternatives and similar repositories for Adversarial_Attack_on_RNN
Users that are interested in Adversarial_Attack_on_RNN are comparing it to the libraries listed below
Sorting:
- Simple implementation of the C&W attack on a pre-trained Keras's InceptionV3 on Imagenet☆10Jan 4, 2021Updated 5 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- 接口自动化测试框架(Java 实现)☆11Mar 13, 2022Updated 3 years ago
- "BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"☆13May 10, 2024Updated last year
- Implementation of reflection symmetry in convolutional layers (Tensorflow 1.X)☆13Oct 15, 2020Updated 5 years ago
- ☆12Sep 14, 2023Updated 2 years ago
- BERT model for text Intent classification to Train and evaluate for detecting seven intents.☆11Jun 6, 2021Updated 4 years ago
- Evaluation of ML models in Android malware classification, adversarial attacks on DNNs & defense mechanisms☆13Jan 14, 2020Updated 6 years ago
- Implementation of handwritten digit classification models trained on MNIST dataset and understanding the No Free Lunch Theorem by testing…☆11Aug 26, 2017Updated 8 years ago
- Provide feedback and suggestions for Fairly AI's global AI regulations map.☆22Jan 30, 2024Updated 2 years ago
- Multiple Fusion Adaptation: A Strong Framework for Unsupervised Semantic Segmentation Adaptation (BMVC 2021, official Pytorch implementat…☆10Jun 20, 2022Updated 3 years ago
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 9 months ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- Starting Point for the CSAW HackML 2020 competition is here: https://www.csaw.io/hackml☆10Dec 5, 2021Updated 4 years ago
- ☆12Jun 13, 2022Updated 3 years ago
- NoSQL notebook☆13Jun 28, 2017Updated 8 years ago
- numerical derivative lib☆13Mar 18, 2014Updated 11 years ago
- Improve JPEG reconstruction using deep learning.☆15Aug 24, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- 扑克牌算法,包含斗地主(癞子),德州扑克等☆12Aug 26, 2019Updated 6 years ago
- Dataset for ICSE 2020 paper "Repairing Deep Neural Networks: Fix Patterns and Challenges"☆10Feb 10, 2020Updated 6 years ago
- This contains the source code for the DeepTag Project☆14Oct 16, 2018Updated 7 years ago
- Code for the paper "Watermarking Makes Language Models Radioactive"☆21Oct 25, 2024Updated last year
- Official code for "Self-supervised learning with rotation-invariant kernels"☆12Jun 5, 2023Updated 2 years ago
- 使用yolov3训练的TT100k(交通标志)模型☆14Sep 29, 2021Updated 4 years ago
- An Automatic DNN TrainingProblem Detection and Repair System☆20Dec 23, 2023Updated 2 years ago
- PGD adversarial training in PyTorch☆13Sep 4, 2019Updated 6 years ago
- Adversarial Images for Variational Autoencoders☆13Nov 30, 2016Updated 9 years ago
- ☆10Dec 7, 2016Updated 9 years ago
- Re-implementation: Ask Me Anything: Dynamic Memory Networks for Natural Language Processing☆14Apr 7, 2019Updated 6 years ago
- ☆14Sep 1, 2022Updated 3 years ago
- Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.☆16Jan 13, 2026Updated last month
- PIKACHU: Temporal Walk Based Dynamic Graph Embedding for Network Anomaly Detection☆17Apr 19, 2023Updated 2 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- ☆15Aug 5, 2020Updated 5 years ago
- ☆18Jun 30, 2022Updated 3 years ago
- Coverage-Guided Testing of Long Short-Term Memory (LSTM) Networks☆18Dec 15, 2020Updated 5 years ago
- ☆25Mar 26, 2025Updated 10 months ago