A pytorch implementation of "Explaining and harnessing adversarial examples"
☆70Sep 4, 2019Updated 6 years ago
Alternatives and similar repositories for FGSM-pytorch
Users that are interested in FGSM-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple pytorch implementation of FGSM and I-FGSM☆294Mar 21, 2018Updated 8 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Sep 4, 2019Updated 6 years ago
- Implementation of (2014) Explaining and Harnessing Adversarial Examples.☆11Jul 30, 2020Updated 5 years ago
- A pytorch implementation of "Intriguing properties of neural networks"☆26Sep 4, 2019Updated 6 years ago
- Implemention of Fast Gradient Sign Method for generating adversarial examples in Keras☆43Apr 6, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Adversarial perturbations on word embeddings of BERT☆13Jan 17, 2021Updated 5 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- [Preprint] "Can 3D Adversarial Logos Cloak Humans?"☆18Dec 30, 2021Updated 4 years ago
- Implementation of Confidence-Calibrated Adversarial Training (CCAT).☆45Aug 3, 2020Updated 5 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- [ICLR 2020] A repository for extremely fast adversarial training using FGSM☆444Jul 25, 2024Updated last year
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Adversarial Active Learning for Deep Networks☆14Oct 16, 2018Updated 7 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'☆55May 26, 2017Updated 8 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- Pytorch reimplementation of "One pixel attack for fooling deep neural networks"☆87Mar 13, 2018Updated 8 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- Weakly supervised deepfake localization☆30Aug 4, 2025Updated 8 months ago
- Unfinished Work: Implementation of Multi-Adversarial Domain Adaptation (https://arxiv.org/abs/1809.02176) in Pytorch☆16Dec 6, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Pytorch Codes for Beginner☆34Mar 1, 2020Updated 6 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆159Sep 4, 2019Updated 6 years ago
- Fantastic Robustness Measures: The Secrets of Robust Generalization [NeurIPS 2023]☆44Jan 13, 2025Updated last year
- Easily find appointments for the Berlin Burgeramt☆14May 17, 2017Updated 8 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- PyTorch Implemetations of Adversarial Examples☆19Jun 25, 2018Updated 7 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Adversarial Generative Network (AGN) implementation in PyTorch☆33Feb 3, 2021Updated 5 years ago
- ☆32Apr 22, 2019Updated 6 years ago
- In-browser GPU-accelerated Generative Adversarial Network trained on Fashion-MNIST dataset (tensorflow + deeplearn.js)☆11Aug 28, 2018Updated 7 years ago
- ☆16Jan 31, 2024Updated 2 years ago
- ☆43May 21, 2020Updated 5 years ago