Pytorch reimplementation of "One pixel attack for fooling deep neural networks"
☆87Mar 13, 2018Updated 8 years ago
Alternatives and similar repositories for one-pixel-attack-pytorch
Users that are interested in one-pixel-attack-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet☆1,231Apr 24, 2024Updated last year
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- Adversarial Images for Variational Autoencoders☆13Nov 30, 2016Updated 9 years ago
- A simple and accurate method to fool deep neural networks☆361Mar 31, 2020Updated 5 years ago
- the pytorch implementation of SubCenterArcface and sphereface2. And i add the prove of easy_margin part of Arcface in the codes.☆12Dec 1, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Codebase for Mechanistic Mode Connectivity☆13Jul 14, 2023Updated 2 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,946Dec 3, 2025Updated 3 months ago
- Simple pytorch implementation of FGSM and I-FGSM☆293Mar 21, 2018Updated 8 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,148Jun 29, 2024Updated last year
- ☆23Apr 10, 2023Updated 2 years ago
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Nov 21, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [ECCV 2022] "Adversarial Contrastive Learning via Asymmetric InfoNCE"☆24Dec 12, 2022Updated 3 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Nov 8, 2020Updated 5 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆70Sep 4, 2019Updated 6 years ago
- Pytorch - Adversarial Training☆25May 9, 2018Updated 7 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago
- ☆12May 6, 2022Updated 3 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆58Sep 4, 2019Updated 6 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆253Oct 30, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆19Oct 6, 2020Updated 5 years ago
- PyTorch implementation of DeepLab v2 (ResNet) + COCO-Stuff 10k/164k☆15Nov 7, 2018Updated 7 years ago
- Experiments on meta-learning algorithms to solve few-shot domain adaptation☆10Aug 5, 2021Updated 4 years ago
- ☆47Feb 21, 2020Updated 6 years ago
- ☆71May 18, 2021Updated 4 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- ☆248Jan 12, 2019Updated 7 years ago
- Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks☆46Feb 24, 2022Updated 4 years ago
- Easily find appointments for the Berlin Burgeramt☆14May 17, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆64Jan 6, 2022Updated 4 years ago
- This is a simple backdoor model for federated learning.We use MNIST as the original data set for data attack and we use CIFAR-10 data set…☆14Jun 19, 2020Updated 5 years ago
- Implementing a simple search-engine based on information retrieval concepts as my IR course project at AUT☆10Sep 5, 2023Updated 2 years ago
- ConvexPolytopePosioning☆37Jan 10, 2020Updated 6 years ago
- Single-Life Reinforcement Learning☆14Dec 17, 2022Updated 3 years ago
- A Toolbox for Adversarial Robustness Research☆1,365Sep 14, 2023Updated 2 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆159Sep 4, 2019Updated 6 years ago