使用pytorch实现FGSM
☆33Aug 13, 2021Updated 4 years ago
Alternatives and similar repositories for FGSM
Users that are interested in FGSM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆105Jul 8, 2021Updated 4 years ago
- ☆18Apr 7, 2025Updated last year
- Black-box Few-shot Knowledge Distillation☆14Jul 19, 2022Updated 3 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- ☆21Jun 10, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 面向目标检测的对抗样本攻击☆24Mar 17, 2021Updated 5 years ago
- Pytorch implementation of RNN, CNN, BiGRU and LSTM for text classifcation☆10Apr 30, 2021Updated 5 years ago
- Author implementation of Exploring Adversarial Fake Images on Face Manifold (CVPR 2021 oral)☆32Mar 2, 2023Updated 3 years ago
- [CVPR-2024] NAYER: Noisy Layer Data Generation for Efficient and Effective Data-free Knowledge Distillation☆16Oct 19, 2024Updated last year
- The code for "MultiWave: Multiresolution Deep Architectures through Wavelet Decomposition for Multivariate Time Series Prediction"☆14Feb 7, 2025Updated last year
- Attacking Speaker Recognition with Deep Generative Models☆34Mar 24, 2023Updated 3 years ago
- [PyTorch Implementation] Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Feb 27, 2021Updated 5 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- A general image manipulation detection model.☆26Mar 6, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 9 months ago
- SEAT☆21Oct 10, 2023Updated 2 years ago
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆19Jun 19, 2023Updated 2 years ago
- Defending against Model Stealing via Verifying Embedded External Features☆38Feb 19, 2022Updated 4 years ago
- Export VMamba to onnx. VMamba: Visual State Space Models,code is based on VMamba: https://github.com/MzeroMiko/VMamba☆22May 13, 2025Updated 11 months ago
- Repository for "Enhanced Super-Resolution Training via Mimicked Alignment for Real-World Scenes", ACCV 2024☆15Dec 2, 2024Updated last year
- ☆34Mar 24, 2023Updated 3 years ago
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- ☆15Jul 25, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆32May 22, 2025Updated 11 months ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- Official implementation of the paper "Robust and Resource-Efficient Data-Free Knowledge Distillation by Generative Pseudo Replay" (AAAI-2…☆18May 5, 2022Updated 4 years ago
- Code of Data-Free Knowledge Distillation via Feature Exchange and Activation Region Constraint☆21Oct 23, 2023Updated 2 years ago
- Perform three types of feature extraction: STFT, MFCC and MelSpectrogram. Apply CNN/VGG with or without RNN architecture. Able to achieve…☆15Jun 28, 2020Updated 5 years ago
- ☆10May 14, 2023Updated 2 years ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- Update BasicSR to support PyTorch2.0 DDP training☆17Mar 23, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆20Aug 30, 2022Updated 3 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- 一个基于io_uring实现的reactor☆10Jun 5, 2022Updated 3 years ago
- The project tries to solve a speaker diarization problem using audio features, face recognition and video feature extraction from face im…☆15Feb 10, 2019Updated 7 years ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆21Apr 16, 2025Updated last year
- 基于X86架构的简单Cminus语言编译器☆10Apr 1, 2022Updated 4 years ago
- 水源社区 API client☆17Dec 11, 2023Updated 2 years ago