Harry24k / AEPW-pytorchView external linksLinks
A pytorch implementation of "Adversarial Examples in the Physical World"
☆18Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for AEPW-pytorch
Users that are interested in AEPW-pytorch are comparing it to the libraries listed below
Sorting:
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- A PyTorch Implementation of Deep Convolutional Generative Adversarial Networks☆12Aug 29, 2018Updated 7 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Nov 3, 2018Updated 7 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- StegaStamp of pytorch version☆71Oct 31, 2023Updated 2 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆70Sep 4, 2019Updated 6 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- Contains notebooks for the PAR tutorial at CVPR 2021.☆35Jun 29, 2021Updated 4 years ago
- ☆12May 26, 2022Updated 3 years ago
- read and write operations across cloud providers☆11Apr 23, 2019Updated 6 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- This repository contains code and bonus content which will be added from time to time for the books "Learning Generative Adversarial Netw…☆13Dec 27, 2021Updated 4 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ☆10Jan 7, 2026Updated last month
- classify plant seedling into weed seedling and crop seedling using CNN☆12Jun 9, 2018Updated 7 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- Target Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning☆10Jul 2, 2019Updated 6 years ago
- ☆11May 30, 2024Updated last year
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- ☆11Jul 2, 2025Updated 7 months ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated 11 months ago
- Android malware classification using both .java files and .so files☆11Jan 19, 2019Updated 7 years ago
- Adversarial Structure Matching for Structured Prediction Tasks☆11Jun 4, 2024Updated last year
- FoC☆17Jul 20, 2025Updated 6 months ago
- ☆12Apr 12, 2024Updated last year
- ☆11Nov 27, 2020Updated 5 years ago
- TensorFlow2.0 implementation FastFCN - https://arxiv.org/pdf/1903.11816v1.pdf☆11Aug 6, 2019Updated 6 years ago
- ☆12Mar 5, 2024Updated last year
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago