The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0
☆28Sep 1, 2023Updated 2 years ago
Alternatives and similar repositories for AdversarialAttack
Users that are interested in AdversarialAttack are comparing it to the libraries listed below
Sorting:
- Based on Pytorch, the Adversarial Attack algorithm DeepFool, targeting the Mnist data set and ResNet18 network☆16Jul 28, 2020Updated 5 years ago
- signal denoising + modulation recognition☆11Aug 7, 2018Updated 7 years ago
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- [NeurIPS 2024] "Membership Inference on Text-to-image Diffusion Models via Conditional Likelihood Discrepancy"☆12Sep 15, 2025Updated 6 months ago
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- Proof-of-concept implementation for the paper "ThermalScope: A Practical Interrupt Side Channel Attack Based On Thermal Event Interrupts"…☆13Dec 17, 2024Updated last year
- ☆17Mar 22, 2025Updated last year
- Tensorflow Custom Callbacks in Custom Training Loop☆10Apr 8, 2021Updated 4 years ago
- ☆12Nov 12, 2020Updated 5 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆15Nov 12, 2018Updated 7 years ago
- Face recognition based on facenet with several networks as backends☆11May 23, 2018Updated 7 years ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- ☆14Jan 17, 2019Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- f-PO: Generalizing Preference Optimization with f-divergence Minimization☆14Apr 2, 2025Updated 11 months ago
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- The implementation of our paper Fed-TDA☆15Jan 11, 2023Updated 3 years ago
- Face recognition usiong keras and tensorflow☆10Jul 21, 2017Updated 8 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- SNN Cutoff Evaluation.☆17Aug 14, 2024Updated last year
- A tool for automatically generating database documents☆24May 15, 2020Updated 5 years ago
- ☆12May 26, 2022Updated 3 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- NDSS18: Detecting Adversarial Examples in Deep Neural Networks☆13Apr 20, 2017Updated 8 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- Scheduled frame transmission on Broadcom Wi-Fi Chips☆13Feb 21, 2023Updated 3 years ago
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆25Sep 5, 2025Updated 6 months ago
- Use Edge TPU (Coral) with ROS based on C++☆12Feb 12, 2021Updated 5 years ago