The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0
☆28Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialAttack
Users that are interested in AdversarialAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- signal denoising + modulation recognition☆11Aug 7, 2018Updated 7 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Neural network from scratch in Python using Numpy☆12May 28, 2017Updated 8 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Jun 7, 2018Updated 7 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 6 months ago
- Blackbox attacks for deep neural network models☆69Aug 2, 2018Updated 7 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Local signatures for 3D shapes with persistent homology☆14Jul 10, 2019Updated 6 years ago
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- TOpological Point Features: Node-Level Topological Representation Learning on Point Clouds☆23Jul 19, 2025Updated 8 months ago
- FeGAN: Scaling Distributed GANs☆13Dec 31, 2020Updated 5 years ago
- Tensorflow Custom Callbacks in Custom Training Loop☆10Apr 8, 2021Updated 5 years ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated 11 months ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A repository for the query-efficient black-box attack, SignHunter☆21Jan 15, 2020Updated 6 years ago
- some examples☆13Oct 17, 2022Updated 3 years ago
- The implementation of our paper Fed-TDA☆15Jan 11, 2023Updated 3 years ago
- ☆10Apr 6, 2018Updated 8 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Implementation of Continuous k-Nearest Neighbors in Python☆13Aug 11, 2023Updated 2 years ago
- ☆12May 26, 2022Updated 3 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆26Sep 5, 2025Updated 7 months ago
- Tensorflow implementation of the Gradient Reversal layer from https://arxiv.org/abs/1505.07818☆13Jun 19, 2018Updated 7 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago