Harry24k / AEPW-pytorchView external linksLinks
A pytorch implementation of "Adversarial Examples in the Physical World"
☆18Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for AEPW-pytorch
Users that are interested in AEPW-pytorch are comparing it to the libraries listed below
Sorting:
- ☆14Jul 25, 2020Updated 5 years ago
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 4 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 4 years ago
- Implementation of Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning paper☆21Jun 3, 2020Updated 5 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆28Apr 1, 2021Updated 4 years ago
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆33May 25, 2021Updated 4 years ago
- StegaStamp of pytorch version☆71Oct 31, 2023Updated 2 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆70Sep 4, 2019Updated 6 years ago
- ☆38Jul 13, 2020Updated 5 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆12Sep 22, 2023Updated 2 years ago
- Learning Backtracking Models, ICLR'19☆10Feb 2, 2018Updated 8 years ago
- SEED Labs学习笔记☆10Apr 10, 2018Updated 7 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- This repository contains code and bonus content which will be added from time to time for the books "Learning Generative Adversarial Netw…☆13Dec 27, 2021Updated 4 years ago
- My solutions for the programming contest website Kattis : open.kattis.com : If you have any questions about the reasoning behind a proble…☆10May 6, 2024Updated last year
- Explainable, more data efficient text classification based on ULMFiT☆11Apr 29, 2020Updated 5 years ago
- ☆11May 30, 2024Updated last year
- Official Implementation of paper https://arxiv.org/abs/1801.02612☆13Jun 16, 2020Updated 5 years ago
- Translate pic to JPEG☆11Mar 6, 2019Updated 6 years ago
- ☆12Apr 12, 2024Updated last year
- 一个用tikz绘制多维评价雷达图的自定义环境,以便于在LaTeX绘制多维评价雷达图。☆12Jan 5, 2019Updated 7 years ago
- ☆14Mar 16, 2020Updated 5 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- ☆12Mar 3, 2025Updated 11 months ago
- Bidirectional Encoder Representations from Transformers (BERT) transfer learning for named entity recognition and de-identification of se…☆10Aug 3, 2019Updated 6 years ago
- LLM for solidity smart contract automated program repair☆18Mar 5, 2025Updated 11 months ago
- ☆11Nov 27, 2020Updated 5 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Examples of Generative Adversarial Networks built using torchgan☆12Jun 11, 2019Updated 6 years ago
- The python notebook is on googles new collabatory tool. Its a churn model being run on 3 different algorithms to compare.☆10Mar 3, 2018Updated 7 years ago
- FoC☆17Jul 20, 2025Updated 6 months ago
- Yossi Mandil & Tomer Gill's Bachelor Degree Final Project under the BIU Cyber Center - Malware & Benign File Classification using Machin…☆10Jun 24, 2018Updated 7 years ago
- https://idrl-lab.github.io/Full-coverage-camouflage-adversarial-attack/☆55Oct 25, 2022Updated 3 years ago
- Generate Markdown representations of your codebase to provide context for Large Language Models (LLMs). Improve LLM interactions (like Ch…☆23Aug 24, 2025Updated 5 months ago
- ☆13Jul 23, 2020Updated 5 years ago