TanmayKhot / Visualizer-for-Adversarial-AttacksLinks
Built a web app to visualize the impact of different adverserial attacks on Images
☆19Updated 5 years ago
Alternatives and similar repositories for Visualizer-for-Adversarial-Attacks
Users that are interested in Visualizer-for-Adversarial-Attacks are comparing it to the libraries listed below
Sorting:
- This project is a reimplementation of the paper Progressive Growing of GANs for Improved Quality, Stability, and Variation☆12Updated 5 months ago
- An implementation of the paper "A Neural Algorithm of Artistic Style"☆29Updated 2 years ago
- An implementation of the paper "A Short Introduction to Boosting"☆21Updated 4 years ago
- Ready-to-use implementations of some of the most common computer vision algorithms☆33Updated 4 years ago
- Web-based Tool for visualisation and generation of adversarial examples by attacking ImageNet Models like VGG, AlexNet, ResNet etc.☆56Updated 2 years ago
- PyTorch implementation of Kaggle GTSRB challenge with 99.8% accuracy☆59Updated 7 years ago
- Creating and defending against adversarial examples☆41Updated 7 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Updated 5 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 5 years ago
- ☆13Updated 6 years ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆84Updated 2 years ago
- A Universal Adversarial Dataset☆35Updated 5 years ago
- ☆89Updated 2 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 3 years ago
- Tiny-ImageNet Classifier using Pytorch☆92Updated 7 years ago
- Defense GAN in pytorch☆13Updated 6 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Updated 4 years ago
- Visualization of Adversarial Examples☆34Updated 7 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Updated 4 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Updated 4 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆18Updated 6 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆75Updated last year
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆26Updated 5 years ago
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Updated 6 years ago
- ☆18Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Updated 2 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Updated 6 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Updated 6 years ago