Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network
☆16Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for DeepFool_MNIST
Users that are interested in DeepFool_MNIST are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- visual point clouds (with bbox) by Plotly☆15Nov 10, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Tensorflow Implementation of "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks", …☆25Aug 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Implementation of (2014) Explaining and Harnessing Adversarial Examples.☆11Jul 30, 2020Updated 5 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Sep 1, 2023Updated 2 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- ☆19Apr 27, 2022Updated 4 years ago
- Benchmarks of approximate nearest neighbor libraries in Python☆11Jul 31, 2020Updated 5 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 6 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆13Sep 6, 2023Updated 2 years ago
- Research Materials for Video Reflection Separation☆10Jan 23, 2020Updated 6 years ago
- A Vanilla CNN model on P300 Speller ERP☆10Aug 6, 2019Updated 6 years ago
- This repository contains the code for our ECCV 2022 paper on our "Non-isotropic Probabilistic Take on Proxy-based Deep Metric Learning".☆12Dec 6, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- ☆14Jun 8, 2015Updated 10 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆254Aug 26, 2020Updated 5 years ago
- Image De-Hazing by finding Transmittance and Airlight☆10Apr 15, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Rust crate containing a set of types for building complex binary streams.☆11Feb 20, 2022Updated 4 years ago
- Using AutoDIAL framework for training US-CT end to end network working on real US images☆10Nov 30, 2017Updated 8 years ago
- This repo contains code for *Merging and Evolution: Improving Convolutional Neural Networks for Mobile Applications*.☆11May 3, 2018Updated 7 years ago
- ☆13Jul 20, 2023Updated 2 years ago
- code for AAAI accepted paper Similarity Distribution based Membership Inference Attack on Person Re-Identification.☆11Sep 29, 2024Updated last year
- ☆10May 16, 2024Updated last year
- This project is the official implementation of "Local and Global Logit Adjustments for Long-Tailed Learning", ICCV 2023☆12Feb 19, 2024Updated 2 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- We define and estimate smooth unique information of samples with respect to classifier weights and predictions. We compute these quantiti…☆11Mar 9, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PyTorch implementation of "Learning Stable Deep Dynamics Models" (https://papers.nips.cc/paper/9292-learning-stable-deep-dynamics-models)…☆17May 1, 2020Updated 6 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- This project furnishes a dataset comprising risk images and pedestrian crossing action labels, derived using a comprehensive multi-path r…☆13Apr 7, 2025Updated last year
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago
- Basics for Machine Learning☆12Apr 26, 2020Updated 6 years ago
- ☆19Jun 26, 2021Updated 4 years ago