Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” AAAI 2018
☆21Sep 22, 2018Updated 7 years ago
Alternatives and similar repositories for EAD-Attack
Users that are interested in EAD-Attack are comparing it to the libraries listed below
Sorting:
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆64Jun 6, 2019Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61May 14, 2019Updated 6 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- Code of "Max-margin Deep Generative Models" (NIPS15)☆18Sep 29, 2015Updated 10 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- ☆89Feb 6, 2021Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆142Aug 23, 2023Updated 2 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 7 years ago
- Robust evasion attacks against neural network to find adversarial examples☆859Jun 1, 2021Updated 4 years ago
- Open Use of Data Agreement - Removing Barriers to Data Innovation☆18Aug 11, 2021Updated 4 years ago
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆147Oct 24, 2018Updated 7 years ago
- ☆13Feb 27, 2024Updated 2 years ago
- Code for experiments on self-prediction as a way to measure introspection in LLMs☆16Dec 10, 2024Updated last year
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- lshash for python3☆10Mar 21, 2018Updated 7 years ago
- Explains the conclusions of a logic program.☆10May 25, 2023Updated 2 years ago
- Functions for handling RNA-seq files and formats as input and output for scrattch functions.☆11Aug 20, 2025Updated 6 months ago
- Debiasing Through Data Attribution☆12May 23, 2024Updated last year
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆88Jul 25, 2024Updated last year
- Evaluation; object detection; AP; precision; Recall; MAP; ROC☆13Jul 5, 2019Updated 6 years ago
- ☆10Jul 21, 2023Updated 2 years ago
- Code for Learning idiolectal style variation in online register☆10May 18, 2023Updated 2 years ago
- "Dissecting cell-type composition and activity-dependent transcriptional state in mammalian brains by massively parallel single-nucleus R…☆13Jan 7, 2018Updated 8 years ago
- A batch (multiple concurrent sequence pairs) implementation of Dynamic Time Warping (DTW) in Theano☆10Sep 13, 2015Updated 10 years ago
- The code and analyses accompanying the manuscript “MetaMap: An atlas of metatranscriptomic reads in human disease-related RNA-seq data”.☆12Nov 28, 2018Updated 7 years ago
- Code for the paper on t-SNE with variable degree of freedom☆12Jun 27, 2019Updated 6 years ago
- Perform differential expression analysis on cohort-scale single cell datasets using linear mixed models☆21Feb 2, 2026Updated last month
- Computational Use of Data Agreement - Removing Barriers to Data Innovation☆21Jun 12, 2023Updated 2 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Dimensionality-reduction and classification for morphology and electrophysiology☆13Sep 23, 2024Updated last year
- ☆10May 14, 2023Updated 2 years ago
- BeyondTrust Endpoint Privilege Management☆12Jun 11, 2025Updated 8 months ago