No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.
☆12Apr 22, 2020Updated 5 years ago
Alternatives and similar repositories for Attack-ImageNet
Users that are interested in Attack-ImageNet are comparing it to the libraries listed below
Sorting:
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆42Apr 1, 2024Updated last year
- NIPS 2017 Adversarial Competition in PyTorch☆14Feb 4, 2018Updated 8 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- ☆20Jun 10, 2020Updated 5 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- ☆15Jan 9, 2026Updated last month
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- ☆28Dec 7, 2025Updated 2 months ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- https://youtu.be/pE7UOYioPKk☆10Feb 16, 2023Updated 3 years ago
- The source code for BMVC 2018 paper - Exemplar-Supported Generative Reproduction for Class Incremental Learning☆13Nov 4, 2018Updated 7 years ago
- ☆88Feb 6, 2021Updated 5 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Oct 27, 2020Updated 5 years ago
- noiseprint2 is a porting of noiseprint to tensorflow 2 and keras☆12Feb 20, 2021Updated 5 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- ☆15Feb 22, 2018Updated 8 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- [JCIM'25] AccFG: Functional Group Extraction and Molecular Structure Comparison☆25Dec 27, 2025Updated 2 months ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- 🖱2021腾讯游戏安全技术竞赛-机器学习 4th☆11Apr 19, 2021Updated 4 years ago
- ☆16Aug 13, 2024Updated last year
- ☆16May 31, 2024Updated last year
- Calculates the DCT at different frequencies in 2D☆15Nov 4, 2018Updated 7 years ago
- 基于虚拟仿真环境下的自动驾驶交通标志识别第三名方案☆10Jan 11, 2020Updated 6 years ago
- Contest Proposal and infrastructure for the Unrestricted Adversarial Examples Challenge☆334Sep 17, 2020Updated 5 years ago
- bug-bounty☆14Jun 5, 2023Updated 2 years ago
- 机器学习论文、博客、书籍等资料☆17Jul 17, 2020Updated 5 years ago
- ☆14May 10, 2025Updated 9 months ago
- 基于Spring全家桶分布式项目☆21Jun 29, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Pure-Go port of the PCRE2 regular expression engine.☆15Aug 5, 2023Updated 2 years ago
- 算法工程师方法论-从数学基础到理论应用☆13Aug 9, 2019Updated 6 years ago