☆29Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for Awesome-Universal-Adversarial-Perturbations
Users that are interested in Awesome-Universal-Adversarial-Perturbations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is official repository for Dual Temperature Helps Contrastive Learning without Many Negative Samples (CVPR2022)☆27Dec 1, 2022Updated 3 years ago
- Code for DeepPTZ: Deep Self-Calibration for PTZ Cameras ( wacv2020 )☆47Aug 26, 2020Updated 5 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆52Mar 3, 2022Updated 4 years ago
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Official code for UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging (Accepted at NeurIPS2020).☆122Jun 21, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Simple object classification project with deep-learning. We choose CIFAR10, CIFAR100 and Caltech101 as training datasets.☆15Jun 22, 2017Updated 8 years ago
- ☆21Aug 7, 2023Updated 2 years ago
- ☆13Nov 10, 2019Updated 6 years ago
- ☆11Jun 20, 2023Updated 2 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆28Aug 17, 2023Updated 2 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆10May 14, 2023Updated 2 years ago
- This is an official repository for "LAVA: Data Valuation without Pre-Specified Learning Algorithms" (ICLR2023).☆53Jun 5, 2024Updated last year
- The code for AAAI2023 (Generating Transferable 3D Adversarial Point Cloud via Random Perturbation Factorization)☆13Dec 24, 2022Updated 3 years ago
- This project is the codes to generate universal adversarial perturbations for EEG-based BCIs.☆11Jul 9, 2020Updated 5 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 6 years ago
- An Orthogonal Classifier for Improving the Adversarial Robustness of Neural Networks☆14Oct 22, 2021Updated 4 years ago
- Implementation of the paper "Exploring the Universal Vulnerability of Prompt-based Learning Paradigm" on Findings of NAACL 2022☆32Jul 11, 2022Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆12Apr 26, 2024Updated last year
- Image classification models on CIFAR10 dataset using pytorch☆15Mar 25, 2021Updated 5 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- [Journal of Artificial Intelligence Research] Source code for our paper "Exploiting Cultural Biases via Homoglyphs in Text-to-Image Synth…☆12Jan 8, 2024Updated 2 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆42Mar 11, 2022Updated 4 years ago
- Archive of Tasks and Results of the Video Browser Showdown☆13Feb 2, 2026Updated last month
- ☆14Oct 6, 2024Updated last year
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago