The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0
☆28Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialAttack
Users that are interested in AdversarialAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- ☆16Oct 23, 2024Updated last year
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- The successful and effective management of a busy and complex warehouse relies upon the control and location of stock within the warehous…☆15Mar 17, 2021Updated 5 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Variational Autoencoder with non-euclidean (hyperbolic) latent space☆12Nov 25, 2022Updated 3 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 8 months ago
- Blackbox attacks for deep neural network models☆69Aug 2, 2018Updated 7 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Local signatures for 3D shapes with persistent homology☆14Jul 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- TOpological Point Features: Node-Level Topological Representation Learning on Point Clouds☆23Jul 19, 2025Updated 10 months ago
- FeGAN: Scaling Distributed GANs☆14Dec 31, 2020Updated 5 years ago
- ☆19Mar 22, 2025Updated last year
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Official implementation of RGB-D co-attention network published at PR.☆10Jan 21, 2022Updated 4 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆25Jan 26, 2025Updated last year
- Face recognition usiong keras and tensorflow☆10Jul 21, 2017Updated 8 years ago
- ☆10Apr 6, 2018Updated 8 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆17Oct 29, 2019Updated 6 years ago
- SNN Cutoff Evaluation.☆17Aug 14, 2024Updated last year
- Robust evasion attacks against neural network to find adversarial examples☆863Jun 1, 2021Updated 4 years ago
- ☆12May 26, 2022Updated 3 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆21Aug 24, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Scheduled frame transmission on Broadcom Wi-Fi Chips☆13Feb 21, 2023Updated 3 years ago
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆27Sep 5, 2025Updated 8 months ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆15Jul 23, 2018Updated 7 years ago
- explanation / demos of topology concepts☆14May 25, 2022Updated 3 years ago