PaddlePaddle / PaddleSleeve
PaddleSleeve
☆77Updated 8 months ago
Alternatives and similar repositories for PaddleSleeve:
Users that are interested in PaddleSleeve are comparing it to the libraries listed below
- ☆43Updated 3 years ago
- white box adversarial attack☆38Updated 4 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 3 years ago
- ☆83Updated 4 years ago
- Robustness benchmark for DNN models.☆66Updated 2 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Updated 3 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Updated 4 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆35Updated 3 years ago
- A novel data-free model stealing method based on GAN☆127Updated 2 years ago
- ☆74Updated 2 years ago
- AI安全☆34Updated 4 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆70Updated 10 months ago
- ☆23Updated 2 years ago
- Code for ML Doctor☆86Updated 6 months ago
- ☆40Updated last year
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆57Updated 3 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆112Updated 5 years ago
- ☆93Updated 4 years ago
- ☆16Updated last year
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 3 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51Updated 3 years ago
- ☆84Updated last year
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated 3 months ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆210Updated 5 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- Official Repository for the CVPR 2020 AdvML Workshop paper "Role of Spatial Context in Adversarial Robustness for Object Detection"☆37Updated 4 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆23Updated 5 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- This is an implementation demo of the ICLR 2021 paper [Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks…☆122Updated 3 years ago
- ☆37Updated 4 years ago