anishmadan23 / adversarial-attacks-pytorchView external linksLinks
This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attack), and Carlini Wagner's L2 attack. Also contained is the code to visualise it, along with a detailed report and a poster explaining the various attacks.
☆32Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for adversarial-attacks-pytorch
Users that are interested in adversarial-attacks-pytorch are comparing it to the libraries listed below
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- Code for the paper "Adversarial Attacks Against Medical Deep Learning Systems"☆67Apr 25, 2019Updated 6 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Oct 24, 2019Updated 6 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- Risk-sensitive Inverse Reinforcement Learning☆11Sep 11, 2019Updated 6 years ago
- Emotion analysis on DREAMER dataset using various Deep Learning Techniques☆13Jan 1, 2021Updated 5 years ago
- 深度学习☆10Jun 9, 2017Updated 8 years ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆14Dec 19, 2025Updated last month
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- Improving Visual Relation Detection using Depth Maps (ICPR 2020)☆47Jul 24, 2022Updated 3 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- Automatic VST synthesizer programmers☆13Dec 4, 2017Updated 8 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- Decoupled Neural Interfaces Using Synthetic Gradients - under develeopment☆11Jun 27, 2025Updated 7 months ago
- Pytorch implementation of HCNAF: Hyper-Conditioned Neural Autoregressive Flow (CVPR 2020)☆15Jun 14, 2020Updated 5 years ago
- Generating global explanations from local ones☆11Nov 11, 2022Updated 3 years ago
- [CVPR2025] Divide and Conquer: Heterogeneous Noise Integration for Diffusion-based Adversarial Purification☆15Nov 9, 2025Updated 3 months ago
- ☆11Mar 24, 2023Updated 2 years ago
- ☆11Dec 1, 2024Updated last year
- Echarts get data from database. Echarts 从数据库中获取动态数据。 The project can run on both eclipse and idea.☆10Oct 18, 2017Updated 8 years ago
- Code for the AAAI 2021 paper "Attributes-Guided and Pure-Visual Attention Alignment for Few-Shot Recognition".☆10Nov 21, 2022Updated 3 years ago
- Empirical Mode Decomposition for images, 2D matrices or other bidimensional data☆12Apr 5, 2018Updated 7 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- ☆11Oct 29, 2024Updated last year
- Implementation of Boundary Attributions for Normal (Vector) Explanations☆11Aug 13, 2021Updated 4 years ago
- POS tagging models for Hindi English Code Mixed Tweets☆11Aug 1, 2018Updated 7 years ago
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 8 years ago
- A Low-level first-order probabilistic programming language, with in built translation constraints for automatic model checking. A flexibl…☆14Apr 16, 2019Updated 6 years ago
- Official repository for "Temporal Disentanglement of Representations for Improved Generalisation in Reinforcement Learning".☆13Jan 25, 2023Updated 3 years ago