Neural Networks exam project. Machine learning algorithm: implementation of FGSM and JSMA attacks by Goodfellow and Papernot.
☆16Jan 13, 2026Updated 2 months ago
Alternatives and similar repositories for BlackBoxAttackDNN
Users that are interested in BlackBoxAttackDNN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference implementation of the PRADA model stealing defense. IEEE Euro S&P 2019.☆35Mar 20, 2019Updated 7 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Nov 4, 2020Updated 5 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- A fault injection framework for spiking neural networks☆11Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆31Oct 10, 2022Updated 3 years ago
- ☆15Sep 17, 2024Updated last year
- CoMeT is a new low-cost RowHammer mitigation that uses Count-Min Sketch-based aggressor row tracking, as described in our HPCA'24 paper h…☆11Jan 23, 2026Updated 2 months ago
- [NeurIPS 2024] Advancing Training Efficiency of Deep Spiking Neural Networks through Rate-based Backpropagation☆19Jan 16, 2025Updated last year
- Metrics for spiking neural networks based on torchmetrics☆13Mar 27, 2023Updated 2 years ago
- An environment based on JSBSIM aimed at one-to-one close air combat.☆13May 15, 2023Updated 2 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- Knockoff Nets: Stealing Functionality of Black-Box Models☆115Dec 8, 2022Updated 3 years ago
- ☆10Jan 22, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PyTorch Implemetations of Adversarial Examples☆19Jun 25, 2018Updated 7 years ago
- ☆13Nov 30, 2021Updated 4 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Create a new backward path for more accurate SNN gradients.☆17Aug 19, 2024Updated last year
- This repository contains the code for all figures in the paper "General Pitfalls of Model-agnostic Interpretation Methods for Machine Lea…☆15Aug 17, 2021Updated 4 years ago
- codes of the paper Rate Gradient Approximation Attack Threats Deep Spiking Neural Networks (CVPR 2023)☆16Aug 19, 2024Updated last year
- Python code implementing the algorithms of my MSc Dissertation on "Modified training for increased robustness in memristor-based neural n…☆17Jan 23, 2022Updated 4 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Apr 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Run-time trojan attack on neural networks☆25Feb 8, 2019Updated 7 years ago
- Adaptive learning platform for physics concept built on ChatGPT knowledge.☆11May 7, 2025Updated 10 months ago
- A tiny node js-based program to listen on 80 port and will log all requests and also send logs to Telegram Bot.☆12May 16, 2021Updated 4 years ago
- The evaluation code for A Safety Report on GPT-5.2, Gemini 3 Pro, Qwen3-VL, Grok 4.1 Fast, Nano Banana Pro, and Seedream 4.5☆53Jan 18, 2026Updated 2 months ago
- 👥 Register to Webinar UI☆13Apr 9, 2022Updated 3 years ago
- A python library for self-supervised learning☆12Nov 17, 2025Updated 4 months ago
- This is the implementation of our paper 'Open-sourced Dataset Protection via Backdoor Watermarking', accepted by the NeurIPS Workshop on …☆23Oct 13, 2021Updated 4 years ago
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Mar 20, 2024Updated 2 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- [Neurips 2025] Max-Former.☆55Jan 19, 2026Updated 2 months ago
- ☆14Jul 13, 2022Updated 3 years ago
- ☆10Mar 13, 2023Updated 3 years ago
- Code for Active Mixup in 2020 CVPR☆23Jan 11, 2022Updated 4 years ago
- A lookahead compressor/limiter that's soft as a lamb.☆15May 3, 2024Updated last year
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- ☆13Nov 10, 2019Updated 6 years ago