aidenyerga / Adversarial-Crafting-FashionMNIST
Adversarial examples crafting for Fashion MNIST
☆7Updated 7 years ago
Alternatives and similar repositories for Adversarial-Crafting-FashionMNIST:
Users that are interested in Adversarial-Crafting-FashionMNIST are comparing it to the libraries listed below
- 面试资料整理☆22Updated 5 years ago
- 对抗性样本攻击与防御☆202Updated 6 years ago
- A Socket-based group chat android app implemented in MVC, MVP, MVVM and FRP☆10Updated 5 years ago
- Utilizing code clone detection to generate comments automatically.☆16Updated 5 years ago
- 软件工程统计方法作业☆8Updated 6 years ago
- Crafting adversarial images☆223Updated 6 years ago
- Trojan Attack on Neural Network☆183Updated 3 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- 记录下自己的面经☆21Updated 6 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆215Updated 5 years ago
- ☆24Updated 4 years ago
- An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'☆55Updated 7 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆283Updated 5 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆98Updated 6 years ago
- DeepInspect code release☆11Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆67Updated 7 years ago
- 南京大学软件学院操作系统2019届加分项☆10Updated 6 years ago
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- 面试经验记录☆14Updated 5 years ago
- ☆16Updated 4 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- Implementation of Papers on Adversarial Examples☆395Updated 2 years ago
- 对抗样本☆267Updated 2 years ago
- sa-bAbI is a software assurance dataset generator similar to the natural language dataset generator☆27Updated 4 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆163Updated 5 years ago
- ☆18Updated 2 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Updated 3 years ago
- Recent Paper About Bug Detection☆31Updated 5 years ago
- Robust evasion attacks against neural network to find adversarial examples☆824Updated 3 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆177Updated 3 years ago