Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets
☆34Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for Ensemble_Adversarial_Attack
Users that are interested in Ensemble_Adversarial_Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Feb 15, 2022Updated 4 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Dec 7, 2024Updated last year
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- PyTorch project example for DL-DIY course at Ecole Polytechnique☆12Feb 25, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 2D detection on KITTI dataset. see configs/kitti☆16Jul 7, 2021Updated 4 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆44Feb 7, 2019Updated 7 years ago
- Black-box Adversarial Attacks on Video Recognition Models. (VBAD)☆27Oct 28, 2019Updated 6 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Image classification using pytorch on German Traffic Sign data set☆10Jan 10, 2021Updated 5 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Aug 17, 2020Updated 5 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- An algorithm based on Java implementation, can automatically check the set of outliers in a set of data, eliminate these outliers, and fi…☆12May 11, 2021Updated 4 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- ☆35May 29, 2024Updated last year
- Simple pytorch classification baselines for MNIST, CIFAR and ImageNet☆19Aug 7, 2019Updated 6 years ago
- PatchAttack (ECCV 2020)☆65May 22, 2020Updated 5 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Oct 17, 2018Updated 7 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An example code of implement of PGD and FGSM algorithm for adversarial attack☆12Mar 3, 2022Updated 4 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- This is the official implementation of our neural-network-based fast diffuse room impulse response generator (FAST-RIR) for generating r…☆12Nov 30, 2021Updated 4 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Aug 22, 2019Updated 6 years ago