Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network
☆16Jul 28, 2020Updated 5 years ago
Alternatives and similar repositories for DeepFool_MNIST
Users that are interested in DeepFool_MNIST are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- visual point clouds (with bbox) by Plotly☆15Nov 10, 2021Updated 4 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tensorflow Implementation of "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks", …☆25Aug 28, 2021Updated 4 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Sep 1, 2023Updated 2 years ago
- AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)☆45Oct 19, 2020Updated 5 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- This repository holds the results of a project on Remaining Useful Lifetime estimation of a turbofan engine for a course of Delft Univers…☆13Jan 18, 2018Updated 8 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Research Materials for Video Reflection Separation☆10Jan 23, 2020Updated 6 years ago
- A Vanilla CNN model on P300 Speller ERP☆10Aug 6, 2019Updated 6 years ago
- This repository contains the code for our ECCV 2022 paper on our "Non-isotropic Probabilistic Take on Proxy-based Deep Metric Learning".☆12Dec 6, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- ☆14Jun 8, 2015Updated 10 years ago
- Image De-Hazing by finding Transmittance and Airlight☆10Apr 15, 2019Updated 6 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆254Aug 26, 2020Updated 5 years ago
- ☆17Aug 17, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Using AutoDIAL framework for training US-CT end to end network working on real US images☆10Nov 30, 2017Updated 8 years ago
- This repo contains code for *Merging and Evolution: Improving Convolutional Neural Networks for Mobile Applications*.☆11May 3, 2018Updated 7 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- code for AAAI accepted paper Similarity Distribution based Membership Inference Attack on Person Re-Identification.☆11Sep 29, 2024Updated last year
- This project is the official implementation of "Local and Global Logit Adjustments for Long-Tailed Learning", ICCV 2023☆12Feb 19, 2024Updated 2 years ago
- NLP/ML面试各类资料链接 汇总(主要Github收集)☆11Mar 3, 2020Updated 6 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- A new architecture of semantic segmentation called Dense-Attention Networks.☆14Nov 10, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of the CVPR2025 paper LoTUS: Large-Scale Machine Unlearning with a Taste of Uncertainty.☆20Sep 10, 2025Updated 7 months ago
- Official implementation of CVPR2020 Paper "Cooling-Shrinking Attack"☆65Jun 22, 2022Updated 3 years ago
- 二分类SVM与多分类SVM的实现☆14Jul 16, 2017Updated 8 years ago
- PyTorch implementation of "Learning Stable Deep Dynamics Models" (https://papers.nips.cc/paper/9292-learning-stable-deep-dynamics-models)…☆17May 1, 2020Updated 5 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- This project furnishes a dataset comprising risk images and pedestrian crossing action labels, derived using a comprehensive multi-path r…☆13Apr 7, 2025Updated last year
- Bullseye Polytope Clean-Label Poisoning Attack☆15Nov 5, 2020Updated 5 years ago