The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0
☆28Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialAttack
Users that are interested in AdversarialAttack are comparing it to the libraries listed below
Sorting:
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- ☆17Mar 22, 2025Updated 11 months ago
- signal denoising + modulation recognition☆10Aug 7, 2018Updated 7 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- Blackbox attacks for deep neural network models☆70Aug 2, 2018Updated 7 years ago
- ☆12May 26, 2022Updated 3 years ago
- ☆10Apr 6, 2018Updated 7 years ago
- Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020)☆10Jan 5, 2022Updated 4 years ago
- A MAC address extraction plugin for the Linux 802.11n Channel State Information (CSI) Measurement Tool.☆12May 29, 2018Updated 7 years ago
- Official code of "Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography"☆12Mar 30, 2024Updated last year
- classify plant seedling into weed seedling and crop seedling using CNN☆12Jun 9, 2018Updated 7 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- Reproduce the paper Distributed Representations of Sentences and Documents in tensorflow☆14Apr 8, 2017Updated 8 years ago
- NLP/ML面试各类资料链接 汇总(主要Github收集)☆11Mar 3, 2020Updated 5 years ago
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 7 years ago
- ☆11Apr 3, 2020Updated 5 years ago
- An implementation of RGB-D co-attention network☆10Jan 21, 2022Updated 4 years ago
- The python notebook is on googles new collabatory tool. Its a churn model being run on 3 different algorithms to compare.☆10Mar 3, 2018Updated 7 years ago
- Basics for Machine Learning☆11Apr 26, 2020Updated 5 years ago
- The implementation of our paper Fed-TDA☆14Jan 11, 2023Updated 3 years ago
- ☆12Nov 7, 2023Updated 2 years ago
- TensorFlow2.0 implementation FastFCN - https://arxiv.org/pdf/1903.11816v1.pdf☆11Aug 6, 2019Updated 6 years ago
- ☆14Jan 17, 2019Updated 7 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- Local signatures for 3D shapes with persistent homology☆13Jul 10, 2019Updated 6 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- SImple Tensorflow implementations of " Image-to-Image Translation with Conditional Adversarial Networks" (CVPR 2017)☆10Apr 11, 2018Updated 7 years ago
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- Code and data from the paper "Targeted Nonlinear Adversarial Perturbations in Images and Videos".☆11Sep 8, 2018Updated 7 years ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆16Jul 23, 2018Updated 7 years ago
- Implementation of Continuous k-Nearest Neighbors in Python☆12Aug 11, 2023Updated 2 years ago
- GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification☆15Mar 25, 2023Updated 2 years ago
- [ECCV 2018] Unsupervised Holistic Image Generation from Key Local Patches☆12Jul 29, 2019Updated 6 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated 11 months ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago