A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- Adversarial Driving v.s. Autonomous Driving.☆23Jul 29, 2023Updated 2 years ago
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆20Feb 1, 2024Updated 2 years ago
- Code example for the paper, "Adversarial Explanations for Understanding Image Classification Decisions and Improved Neural Network Robust…☆23Feb 21, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This projects detects ongoing Spectre attacks, by using a neural network to analyze HPCs (Hardware Performance Counters)☆31Oct 16, 2018Updated 7 years ago
- python RobustRMC projects☆10Apr 22, 2024Updated last year
- Faster-RCNN with only one page of jupyter notebook;只用一页jupyter notebook完成Faster RCNN☆11May 6, 2020Updated 5 years ago
- ☆14Oct 10, 2022Updated 3 years ago
- Hyperspectral image classification by exploring deep tensor facorization, published in IGARSS 2018.☆16Jan 3, 2019Updated 7 years ago
- This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust aut…☆19Mar 24, 2023Updated 3 years ago
- Code for paper "Efficient Sparse Coding using Hierarchical Riemannian Pursuit," in IEEE Transactions on Signal Processing, Y. Xue, V. K. …☆13Jul 20, 2021Updated 4 years ago
- Contains different RX-based anomaly detection algorithms designed for real-time hyperspectral line-scan/pushbroom cameras.☆15Feb 15, 2025Updated last year
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- ☆17Oct 16, 2024Updated last year
- Feature selection for machine learning using mutual information.☆15Dec 4, 2024Updated last year
- ☆17Nov 24, 2025Updated 4 months ago
- A HYBRID APPROACH TO ANOMALY DETECTION USING FUZZY LOGIC TUNED WITH EVOLUTIONARY ALGORITHMS☆16Dec 12, 2014Updated 11 years ago
- This is official code for ASFL.☆22Mar 3, 2025Updated last year
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆33Jun 7, 2022Updated 3 years ago
- Solution of HackerEarth coding questions in JAVA 8.☆11Aug 17, 2020Updated 5 years ago
- ☆11Oct 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Jan 17, 2019Updated 7 years ago
- Code for the paper "Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation" by Alexander Levine and Soheil Feizi.☆10Aug 22, 2022Updated 3 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- Code repository for CVPR2024 paper 《Pre-trained Model Guided Fine-Tuning for Zero-Shot Adversarial Robustness》☆25May 29, 2024Updated last year
- A small C++ library for efficient calculation of rotation invariant features in 2D images using OpenCV.☆12Feb 12, 2021Updated 5 years ago
- Code for L4DC 2022 paper: Joint Synthesis of Safety Certificate and Safe Control Policy Using Constrained Reinforcement Learning.☆15Jul 31, 2023Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- [IEEE TCSVT 2023] The implementation of our paper Semi-Supervised Subspace Clustering via Tensor Low-Rank Representation.☆25Dec 21, 2023Updated 2 years ago
- Code for EDLCV 2020 paper "Learning Low-rank Deep Neural Networks via Singular Vector Orthogonality Regularization and Singular Value Spa…☆21Apr 18, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All the files needed for the Terrapin Hackers Hacktorial on Behavioral Cloning for Self Driving Cars.☆13Jan 16, 2018Updated 8 years ago
- Python scripts to facilitate easy working☆11Mar 23, 2026Updated 3 weeks ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- This repository includes a realization of the resilient projection-based consensus actor-critic algorithm that is resilient to adversaria…☆11May 23, 2022Updated 3 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- A general approach for using deep neural network for digital watermarking☆15Mar 30, 2020Updated 6 years ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago