aidenyerga / Adversarial-Crafting-FashionMNIST
Adversarial examples crafting for Fashion MNIST
☆7Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Adversarial-Crafting-FashionMNIST
- 面试资料整理☆22Updated 5 years ago
- 南软几个课程的本科复习资料☆68Updated 3 years ago
- 对抗性样本攻击与防御☆199Updated 6 years ago
- A Socket-based group chat android app implemented in MVC, MVP, MVVM and FRP☆10Updated 5 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Updated 6 years ago
- 对抗样本☆264Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated last week
- Trojan Attack on Neural Network☆180Updated 2 years ago
- ☆91Updated 4 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- ☆79Updated 5 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Updated 6 years ago
- Crafting adversarial images☆223Updated 5 years ago
- An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'☆53Updated 7 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆42Updated 5 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- ☆24Updated 4 years ago
- 软件工程统计方法作业☆8Updated 6 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- 记录下自己的面经☆21Updated 5 years ago
- ☆13Updated 4 years ago
- [AAAI'21] Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification☆28Updated 5 months ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆243Updated 5 years ago
- A pytorch implementation of "Adversarial Examples in the Physical World"☆17Updated 5 years ago
- 南京大学软件学院《高级算法》2019课程OJ题目代码☆49Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆92Updated 3 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆46Updated 6 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆186Updated last year
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆269Updated 4 years ago
- Paper list of Adversarial Examples☆44Updated last year