A simple tutorial on adversarial attacks against deep neural networks
☆34Nov 10, 2025Updated 5 months ago
Alternatives and similar repositories for adversarial_attack_tutorial
Users that are interested in adversarial_attack_tutorial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆28May 17, 2024Updated last year
- ☆21Sep 23, 2025Updated 6 months ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆39Jun 14, 2023Updated 2 years ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆58Dec 12, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Creating High-Fidelity Synthetic GPS Trajectory Dataset for Urban Mobility Analysis☆22Mar 12, 2026Updated 3 weeks ago
- ☆13Aug 26, 2024Updated last year
- Implementation of R2-Dreamer.☆63Mar 5, 2026Updated last month
- ☆11Dec 15, 2024Updated last year
- We present **FOCI**, a benchmark for Fine-grained Object ClassIfication for large vision language models (LVLMs).☆19Jun 21, 2024Updated last year
- ☆11Apr 6, 2024Updated 2 years ago
- ☆15Dec 18, 2024Updated last year
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆24Feb 13, 2024Updated 2 years ago
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆22Oct 29, 2025Updated 5 months ago
- Benchmarking general decision-making with open & random worlds☆20Mar 27, 2026Updated 2 weeks ago
- A Pytorch implementation of ViT - VisionTransformer☆14Aug 19, 2022Updated 3 years ago
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- LLMs for Wargames☆20Sep 21, 2024Updated last year
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated 2 years ago
- Implementation of Adversarial Multi-Distillation for Automatic Modulation Recognition Models.☆27Nov 2, 2023Updated 2 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Falcon9 soft landing simulation based on Simulink and FlightGear☆22Aug 11, 2020Updated 5 years ago
- Deepfakes with an adversarial twist.☆28Jul 28, 2020Updated 5 years ago
- ☆23Apr 7, 2025Updated last year
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆23Jul 29, 2025Updated 8 months ago
- ☆28Sep 22, 2022Updated 3 years ago
- 010Editor Templates☆13May 29, 2024Updated last year
- The code for the Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness paper☆22Nov 8, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- A Survey of Physical Adversarial Attack in Computer Vision☆30Jul 23, 2024Updated last year
- ☆26Dec 14, 2020Updated 5 years ago
- ☆24Aug 16, 2024Updated last year
- 离线文档库☆14Jun 17, 2020Updated 5 years ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 6 years ago
- Code accompanying the paper "Off-Policy Primal-Dual Safe Reinforcement Learning"☆21Mar 29, 2024Updated 2 years ago