Rainwind1995 / FGSMLinks
使用pytorch实现FGSM
☆32Updated 4 years ago
Alternatives and similar repositories for FGSM
Users that are interested in FGSM are comparing it to the libraries listed below
Sorting:
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 5 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆104Updated 3 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆434Updated last week
- ☆31Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Updated 2 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Updated 6 years ago
- The official implementation of the IEEE S&P`22 paper "SoK: How Robust is Deep Neural Network Image Classification Watermarking".☆117Updated 2 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Updated 4 years ago
- Implementation of IEEE TNNLS 2023 and Elsevier PR 2023 papers on backdoor watermarking for deep classification models with unambiguity an…☆19Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆61Updated last year
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆137Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆116Updated 6 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆114Updated 3 years ago
- Website & Documentation: https://sbaresearch.github.io/model-watermarking/☆25Updated 2 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Updated 4 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Updated 4 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆193Updated 3 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆94Updated 3 years ago
- ☆577Updated 6 months ago
- [CVPR2023]Discrete Point-wise Attack Is Not Enough: Generalized Manifold Adversarial Attack for Face Recognition☆41Updated 2 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Updated 2 years ago
- ☆12Updated 2 months ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Updated 6 years ago
- [AAAI 2022] CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes☆108Updated last year
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Updated 2 months ago
- ☆224Updated 5 months ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Updated 3 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆133Updated 2 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆276Updated 5 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆21Updated 4 years ago