A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Mar 14, 2022Updated 4 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- The source codes of TDv2 in paper: TDv2: A Novel Tree-Structured Decoder for Offline Mathematical Expression Recognition.☆12Jul 28, 2022Updated 3 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Official implementation of "Deep Rank-One Tensor Functional Factorization for Multi-Dimensional Data Recovery," AAAI 2025☆14Jan 21, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation for Hyper-Laplacian Regularized Multi-View Clustering with Exclusive L21 Regularization and Tensor Log-Determinant Minimiz…☆11Mar 22, 2023Updated 3 years ago
- Faster-RCNN with only one page of jupyter notebook;只用一页jupyter notebook完成Faster RCNN☆11May 6, 2020Updated 5 years ago
- ☆14Oct 10, 2022Updated 3 years ago
- Repository implementing the lightweight split learning framework enabling edge devices to collaboratively train machine learning models w…☆10Mar 27, 2024Updated 2 years ago
- Hyperspectral image classification by exploring deep tensor facorization, published in IGARSS 2018.☆16Jan 3, 2019Updated 7 years ago
- This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust aut…☆19Mar 24, 2023Updated 3 years ago
- Riemannian metrics to measure distances in latent space of VAEs☆14Jan 7, 2019Updated 7 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- ☆12Feb 15, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Infrared Dim and Small Target Detection via Multiple Subspace Learning and Spatial-temporal Patch-Tensor Model☆15May 9, 2022Updated 3 years ago
- X. Wang, Y. Zhong, C. Cui, L. Zhang and Y. Xu, "Autonomous Endmember Detection via an Abundance Anomaly Guided Saliency Prior for Hypersp…☆13Jun 28, 2021Updated 4 years ago