An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack
☆11Feb 25, 2022Updated 4 years ago
Alternatives and similar repositories for AGSM-DE
Users that are interested in AGSM-DE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- Master thesis on image denoising with the Natural Image Noise Dataset, convolutional neural networks, and generative adverserial networks…☆11Jul 20, 2023Updated 2 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- python正则表达式 匹配所有URL☆12Mar 17, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- Multi-objective Simulated Annealing for Hyper-parameter Optimization in Convolutional Neural Networks☆11Feb 4, 2021Updated 5 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- 针对我们参与过鹅厂校招,并被大菜菜内推过的同学,或许点评与学习简历☆14Apr 19, 2020Updated 5 years ago
- Fork of cma-es library by Nikolaus Hansen☆12Jul 12, 2017Updated 8 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- RuDaS: Synthetic Datasets for Rule Learning☆19Jun 21, 2022Updated 3 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Unsupervised Model-based Dense Face Alignment☆10Aug 27, 2020Updated 5 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- Graph Knowledge Distillation☆13Mar 6, 2020Updated 6 years ago
- Reproducing CIFAR10 experiment results from the original ResNet paper using Pytorch in IPython notebook.☆19Mar 4, 2020Updated 6 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Supporting code for doi 10.1021/acs.jcim.0c01344☆23Sep 10, 2022Updated 3 years ago
- ☆19Sep 2, 2021Updated 4 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Convolutional Neural Network with Median Layers for Denoising Salt-and-Pepper Contaminations☆20Mar 24, 2023Updated 3 years ago
- ☆18Sep 26, 2021Updated 4 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- ☆57Mar 24, 2023Updated 3 years ago
- ☆21Apr 10, 2023Updated 2 years ago
- A tensorflow implementation of EAST text detector☆14Dec 21, 2018Updated 7 years ago
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆12May 6, 2020Updated 5 years ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- 微信小程序地图定位选点存储Demo. A LBS Wxapp to collect POI.☆24Jan 14, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Sep 22, 2023Updated 2 years ago
- StyleGAN, ProGAN, and ResNet GANs to experiment with☆15Jan 21, 2021Updated 5 years ago
- Strength Pareto Evolutionary Algorithm v2 implementation in python☆15Jun 18, 2019Updated 6 years ago
- reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch☆16Dec 4, 2017Updated 8 years ago
- ☆11Jan 2, 2020Updated 6 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15May 11, 2020Updated 5 years ago