A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆137Dec 17, 2020Updated 5 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- The code of CVPR2024 "S^2MVTC: a Simple yet Efficient Scalable Multi-View Tensor Clustering "☆11Apr 3, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- python RobustRMC projects☆10Apr 22, 2024Updated 2 years ago
- Implementation for Hyper-Laplacian Regularized Multi-View Clustering with Exclusive L21 Regularization and Tensor Log-Determinant Minimiz…☆11Mar 22, 2023Updated 3 years ago
- ☆20Jan 26, 2025Updated last year
- ☆14Oct 10, 2022Updated 3 years ago
- Repository implementing the lightweight split learning framework enabling edge devices to collaboratively train machine learning models w…☆10Mar 27, 2024Updated 2 years ago
- This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust aut…☆19Mar 24, 2023Updated 3 years ago
- Hyperspectral image classification by exploring deep tensor facorization, published in IGARSS 2018.☆16Jan 3, 2019Updated 7 years ago
- The released code of IRTNN algorithm, mainly proposed in the paper "Generalized Nonconvex Approach for Low-Tubal-Rank Tensor Recovery" pu…☆11May 6, 2023Updated 3 years ago
- SULoRA: Danfeng Hong, Xiaoxiang Zhu. Subspace Unmixing with Low-Rank Attribute Embedding for Hyperspectral Data Analysis, IEEE JSTSP, 201…☆12Sep 10, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Riemannian metrics to measure distances in latent space of VAEs☆14Jan 7, 2019Updated 7 years ago
- Contains different RX-based anomaly detection algorithms designed for real-time hyperspectral line-scan/pushbroom cameras.☆15Feb 15, 2025Updated last year
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- The matlab code is for the paper ''Improved Robust Tensor Principal Component Analysis via Low Rank Core Matrix''.☆15Oct 21, 2018Updated 7 years ago
- ☆12Feb 15, 2025Updated last year
- ☆17Oct 16, 2024Updated last year
- Infrared Dim and Small Target Detection via Multiple Subspace Learning and Spatial-temporal Patch-Tensor Model☆15May 9, 2022Updated 3 years ago
- X. Wang, Y. Zhong, C. Cui, L. Zhang and Y. Xu, "Autonomous Endmember Detection via an Abundance Anomaly Guided Saliency Prior for Hypersp…☆13Jun 28, 2021Updated 4 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is official code for ASFL.☆22Mar 3, 2025Updated last year
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆34Jun 7, 2022Updated 3 years ago
- PyTorch implementation of Pseudo-Riemannian Graph Convolutional Networks (NeurIPS'22))☆19Jul 5, 2024Updated last year
- ☆37Jul 3, 2024Updated last year
- Solution of HackerEarth coding questions in JAVA 8.☆11Aug 17, 2020Updated 5 years ago
- ☆11Oct 2, 2020Updated 5 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆45Aug 29, 2021Updated 4 years ago
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆11Sep 20, 2019Updated 6 years ago
- A small C++ library for efficient calculation of rotation invariant features in 2D images using OpenCV.☆12Feb 12, 2021Updated 5 years ago
- This project aims to realize the robust tensor completion algorithms via tensor ring decomposition.☆16Aug 5, 2021Updated 4 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- VAEGAN, I Love u☆16Aug 15, 2023Updated 2 years ago
- Code for L4DC 2022 paper: Joint Synthesis of Safety Certificate and Safe Control Policy Using Constrained Reinforcement Learning.☆15Jul 31, 2023Updated 2 years ago
- ☆16May 9, 2022Updated 4 years ago