Rainwind1995 / FGSMView external linksLinks
使用pytorch实现FGSM
☆32Aug 13, 2021Updated 4 years ago
Alternatives and similar repositories for FGSM
Users that are interested in FGSM are comparing it to the libraries listed below
Sorting:
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Aug 24, 2020Updated 5 years ago
- utilizing GAN and AutoEncoder for denoising☆10Nov 26, 2019Updated 6 years ago
- Evaluation; object detection; AP; precision; Recall; MAP; ROC☆13Jul 5, 2019Updated 6 years ago
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- Video packaging platform - this will build a Docker with a web API that will let you upload, encrypt and serve videos as MPEG DASH files☆11Sep 6, 2020Updated 5 years ago
- Black-box Few-shot Knowledge Distillation☆13Jul 19, 2022Updated 3 years ago
- 基于X86架构的简单Cminus语言编译器☆10Apr 1, 2022Updated 3 years ago
- A python script that can transfer ckpt file to pb file☆10Oct 24, 2020Updated 5 years ago
- ☆10May 14, 2023Updated 2 years ago
- ☆12May 27, 2021Updated 4 years ago
- An Image Encryption Scheme Based on Chaotic Logarithmic Map and Key Generation using Deep CNN☆17Dec 29, 2020Updated 5 years ago
- My simple compile program☆12May 23, 2017Updated 8 years ago
- Automated Simulations of Adversarial Attacks on Arbitrary Objects in Realistic Scenes☆14Oct 5, 2025Updated 4 months ago
- [CVPR-2024] NAYER: Noisy Layer Data Generation for Efficient and Effective Data-free Knowledge Distillation☆16Oct 19, 2024Updated last year
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Improve safety, security, and privacy of AI systems at build, deploy and run stages.☆29Jan 27, 2026Updated 2 weeks ago
- Repository for "Enhanced Super-Resolution Training via Mimicked Alignment for Real-World Scenes", ACCV 2024☆15Dec 2, 2024Updated last year
- ☆15Jul 25, 2023Updated 2 years ago
- 一些常见攻击算法的实现☆16May 13, 2021Updated 4 years ago
- 使用去噪深度卷积自动编码器对MNIST图像进行去噪☆16Mar 26, 2019Updated 6 years ago
- A python module to create DOCX documents☆16Dec 3, 2015Updated 10 years ago
- ☆20Feb 3, 2021Updated 5 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 6 months ago
- A rich-documented PyTorch implementation of Carlini-Wagner's L2 attack.☆60Aug 3, 2018Updated 7 years ago
- Keyword spotting on Arm Cortex-M Microcontrollers☆14May 20, 2019Updated 6 years ago
- Codes and Dataset (DFDM) for Face-swap Deepfakes Model Attribution☆22Jul 13, 2025Updated 7 months ago
- Latent Space Virtual Adversarial Training (ECCV 2020)☆17Nov 12, 2020Updated 5 years ago
- 新冠疫情可视化☆17Dec 22, 2020Updated 5 years ago
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆18Jun 19, 2023Updated 2 years ago
- Provide implementations and pre-trained models of MobileNet-v1, v2, and v3☆16Dec 11, 2020Updated 5 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆159Sep 4, 2019Updated 6 years ago
- Official implementation of the paper "Robust and Resource-Efficient Data-Free Knowledge Distillation by Generative Pseudo Replay" (AAAI-2…☆18May 5, 2022Updated 3 years ago
- 基于Celery+Redis分布式队列的Src子域名资产收集项目,用于POC批量利用的前期信息收集阶段☆16May 27, 2020Updated 5 years ago
- PPGANs: Privacy-preserving Generative Adversarial Networks.☆17Dec 8, 2022Updated 3 years ago
- an efficient method for detecting adversarial image examples☆18Jun 3, 2018Updated 7 years ago
- ☆14Nov 7, 2016Updated 9 years ago
- The implementation for the NeurIPS 2022 paper Parameter-free Dynamic Graph Embedding for Link Prediction.☆16Dec 7, 2022Updated 3 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Jul 19, 2018Updated 7 years ago
- Official Source Code of "Exploring Effective Data for Surrogate Training Towards Black-box Attack" and "STDatav2: Accessing Efficient Bla…☆20Apr 16, 2025Updated 9 months ago