anirudh9784 / Adversarial-Attacks-and-DefencesView external linksLinks
A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Mar 14, 2022Updated 3 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Code example for the paper, "Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robust…☆23Feb 21, 2024Updated last year
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆20Feb 1, 2024Updated 2 years ago
- This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust aut…☆19Mar 24, 2023Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆20Dec 12, 2025Updated 2 months ago
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated last year
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- ☆37Jul 3, 2024Updated last year
- G4T0R2 - TEKNOFEST 2024 Türkçe Doğal Dil İşleme - Senaryo Ekibi #Acıkhack2024TDDİ☆10Jan 25, 2025Updated last year
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- Repository implementing the lightweight split learning framework enabling edge devices to collaboratively train machine learning models w…☆10Mar 27, 2024Updated last year
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- ☆14Apr 1, 2025Updated 10 months ago
- ☆16Jan 26, 2025Updated last year
- ☆12Feb 15, 2025Updated last year
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated 11 months ago
- python RobustRMC projects☆10Apr 22, 2024Updated last year
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆14Dec 19, 2025Updated last month
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 2 months ago
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆15Nov 10, 2020Updated 5 years ago
- ☆10May 26, 2024Updated last year
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- ☆13Sep 23, 2024Updated last year
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- ☆13Dec 5, 2022Updated 3 years ago
- ☆13Jul 26, 2021Updated 4 years ago
- [ICMI2017] EmotiW 2017 Challenge (INHA University)☆10Jun 10, 2018Updated 7 years ago
- Twitch Extension Boilerplate setup to use VueJS and Laravel Mix.☆11Apr 16, 2024Updated last year
- QR code visual cryptography pipeline☆14Jul 7, 2020Updated 5 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- An intrusion detection system model developed using CNN and Bi-LSTM.☆13Jun 25, 2022Updated 3 years ago
- ☆15Oct 16, 2024Updated last year