The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0
☆28Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialAttack
Users that are interested in AdversarialAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- signal denoising + modulation recognition☆11Aug 7, 2018Updated 7 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- The successful and effective management of a busy and complex warehouse relies upon the control and location of stock within the warehous…☆15Mar 17, 2021Updated 5 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Dec 18, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- FeGAN: Scaling Distributed GANs☆14Dec 31, 2020Updated 5 years ago
- ☆19Mar 22, 2025Updated last year
- Tensorflow Custom Callbacks in Custom Training Loop☆10Apr 8, 2021Updated 5 years ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated 11 months ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Face recognition based on facenet with several networks as backends☆11May 23, 2018Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- A PyTorch implementation of "Towards Self-Explainable Graph Neural Network" (CIKM 2021).☆13Nov 4, 2021Updated 4 years ago
- some examples☆13Oct 17, 2022Updated 3 years ago
- f-PO: Generalizing Preference Optimization with f-divergence Minimization☆14Apr 2, 2025Updated last year
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- The implementation of our paper Fed-TDA☆15Jan 11, 2023Updated 3 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆17Oct 29, 2019Updated 6 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Jul 31, 2020Updated 5 years ago
- Robust evasion attacks against neural network to find adversarial examples☆861Jun 1, 2021Updated 4 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆26Sep 5, 2025Updated 7 months ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆16Jul 23, 2018Updated 7 years ago
- Use Edge TPU (Coral) with ROS based on C++☆12Feb 12, 2021Updated 5 years ago
- Deep Random Projector: Accelerated Deep Image Prior☆18Jun 9, 2023Updated 2 years ago
- Tensorflow implementation of the Gradient Reversal layer from https://arxiv.org/abs/1505.07818☆13Jun 19, 2018Updated 7 years ago
- Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)☆22Dec 30, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆19Feb 3, 2023Updated 3 years ago
- Code for our CVPR 2023 paper: Black-Box Sparse Adversarial Attack via Multi-Objective Optimisation☆29Jul 9, 2024Updated last year
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago
- ML Open Sessions for Quant Club, SAIF http://www.saif.sjtu.edu.cn/☆18Oct 3, 2020Updated 5 years ago
- 对抗样本☆276Dec 8, 2022Updated 3 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago