A simple and accurate method to fool deep neural networks
☆363Mar 31, 2020Updated 6 years ago
Alternatives and similar repositories for DeepFool
Users that are interested in DeepFool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆250Jan 12, 2019Updated 7 years ago
- Robust evasion attacks against neural network to find adversarial examples☆863Jun 1, 2021Updated 4 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,958Dec 3, 2025Updated 5 months ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,433Apr 10, 2024Updated 2 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".☆13Sep 11, 2020Updated 5 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- Crafting adversarial images☆222Jan 3, 2019Updated 7 years ago
- ☆17Dec 28, 2017Updated 8 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆764May 3, 2022Updated 4 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆510Aug 30, 2021Updated 4 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- ImageNet classifier with state-of-the-art adversarial robustness☆683Dec 31, 2019Updated 6 years ago
- A Toolbox for Adversarial Robustness Research☆1,368Sep 14, 2023Updated 2 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆295Mar 21, 2018Updated 8 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Dec 4, 2022Updated 3 years ago
- A fast sparse attack on deep neural networks.☆51Sep 27, 2020Updated 5 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Pytorch reimplementation of "One pixel attack for fooling deep neural networks"☆87Mar 13, 2018Updated 8 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,157Jun 29, 2024Updated last year
- A method for training neural networks that are provably robust to adversarial attacks.☆392Feb 16, 2022Updated 4 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆260Apr 16, 2021Updated 5 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Dec 8, 2022Updated 3 years ago
- Implementation of Papers on Adversarial Examples☆396Apr 24, 2023Updated 3 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆72Jun 21, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,988Dec 12, 2025Updated 5 months ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 7 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 4 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,406Feb 15, 2023Updated 3 years ago
- Codes for reproducing the experimental results in "CNN-Cert: An Efficient Framework for Certifying Robustness of Convolutional Neural Net…☆28Jun 23, 2021Updated 4 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 3 years ago