aidenyerga / Adversarial-Crafting-FashionMNIST
Adversarial examples crafting for Fashion MNIST
☆7Updated 7 years ago
Alternatives and similar repositories for Adversarial-Crafting-FashionMNIST:
Users that are interested in Adversarial-Crafting-FashionMNIST are comparing it to the libraries listed below
- 面试资料整理☆22Updated 5 years ago
- 对抗性样本攻击与防御☆201Updated 6 years ago
- 南软几个课程的本科复习资料☆68Updated 3 years ago
- 软件工程统计方法作业☆8Updated 6 years ago
- A Socket-based group chat android app implemented in MVC, MVP, MVVM and FRP☆10Updated 5 years ago
- 记录下自己的面经☆21Updated 5 years ago
- Detecting Adversarial Examples in Deep Neural Networks☆66Updated 6 years ago
- Demo for software design of the coursework to be assigned on Introduction to Embedded Systems in the first semester of Year 2017-2018, So…☆34Updated 6 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆210Updated 5 years ago
- source code backup of mooctest cases☆18Updated 5 years ago
- ☆93Updated 4 years ago
- An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'☆54Updated 7 years ago
- Trojan Attack on Neural Network☆183Updated 2 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆277Updated 4 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆11Updated 3 years ago
- Implemention of Fast Gradient Sign Method for generating adversarial examples in Keras☆46Updated 5 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆97Updated 6 years ago
- ☆78Updated 5 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆32Updated 6 years ago
- Crafting adversarial images☆223Updated 6 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆93Updated 4 years ago
- 南京大学软件学院操作系统2019届加分项☆10Updated 6 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆235Updated 5 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆53Updated 2 months ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 5 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆175Updated 3 years ago
- Vision based algorithms for falsification of convolutional neural networks☆12Updated 7 years ago
- Adversarial attack on sentiment classification task.☆9Updated 5 years ago