A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Mar 14, 2022Updated 3 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below
Sorting:
- S.-S. Young, Chia-Hsiang Lin, et al., “Unsupervised abundance matrix reconstruction transformer guided fractional attention mechanism for…☆20Oct 26, 2024Updated last year
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Feb 5, 2021Updated 5 years ago
- Official implementation of the paper DiffDefence: defending against adversarial attacks via diffusion models. ICIAP 2023.☆20Feb 1, 2024Updated 2 years ago
- This repository contains the codes to reproduce the results of our proposed novelty detection algorithm based on adversarially robust aut…☆19Mar 24, 2023Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated 2 months ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆21Feb 26, 2026Updated last week
- This repository contains the code for paper, ''Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,” in IEEE Transacti…☆12Feb 25, 2024Updated 2 years ago
- One critical issue within network security refers to intrusion detection. The nature of intrusion attempts appears to be nonlinear, where…☆10Sep 29, 2022Updated 3 years ago
- ODSC 2023 workshop materials on causal graphs using implementations of DoWhy (PyWhy, EconML)☆13Nov 1, 2023Updated 2 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated 2 years ago
- ☆12Feb 15, 2025Updated last year
- Repository implementing the lightweight split learning framework enabling edge devices to collaboratively train machine learning models w…☆10Mar 27, 2024Updated last year
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 3 months ago
- [KBS 2025] Multi-View Contrastive Network (MVCNet) for Motor Imagery Classification☆21Aug 10, 2025Updated 6 months ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- python RobustRMC projects☆10Apr 22, 2024Updated last year
- This repository includes code for the paper "Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networ…☆14Mar 5, 2025Updated last year
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- Feature Selection using Simulated Annealing☆11Aug 10, 2022Updated 3 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- Tensorflow implementation of SoftTriple Loss: Deep Metric Learning Without Triplet Sampling☆10Sep 26, 2019Updated 6 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- MRC-LSTM: A Hybrid Approach of Multi-scale Residual CNN and LSTM to Predict Bitcoin Price☆11Jun 13, 2022Updated 3 years ago
- RBLJAN: Robust Byte-Label Joint Attention Network for Network Traffic Classification☆15Oct 17, 2024Updated last year
- ☆11Jul 19, 2022Updated 3 years ago
- Official implementation of "Deep Rank-One Tensor Functional Factorization for Multi-Dimensional Data Recovery," AAAI 2025☆14Jan 21, 2025Updated last year
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- ☆10Mar 11, 2023Updated 2 years ago
- Learning Deep Disentangled Embeddings with the F-Statistic Loss (NIPS 2018)☆10Oct 17, 2018Updated 7 years ago
- pytorch implementation for "Mutual Information Neural Estimation"☆11Dec 13, 2019Updated 6 years ago
- ☆10Nov 13, 2025Updated 3 months ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- The source code for "A Simple Graph Contrastive Learning Framework for Short Text Classification"☆13Aug 14, 2025Updated 6 months ago
- Pre-trained Online Contrastive Learning for Insurance Fraud Detection☆12Jul 12, 2024Updated last year
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆15Jan 22, 2025Updated last year
- ☆11Oct 28, 2023Updated 2 years ago