This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attack), and Carlini Wagner's L2 attack. Also contained is the code to visualise it, along with a detailed report and a poster explaining the various attacks.
☆33Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for adversarial-attacks-pytorch
Users that are interested in adversarial-attacks-pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆19Jun 26, 2021Updated 4 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Code for the paper "Adversarial Attacks Against Medical Deep Learning Systems"☆67Apr 25, 2019Updated 6 years ago
- CIFS: Improving Adversarial Robustness of CNNs via Channel-wise Importance-based Feature Selection☆20Oct 12, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- ☆12May 27, 2022Updated 3 years ago
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- Grad-CAM for weakly object detection☆12Dec 19, 2018Updated 7 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Oct 24, 2019Updated 6 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- Tensorflow Implementation of adversarial learning based adversarial example generator☆10Jan 31, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection☆11Jan 23, 2023Updated 3 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated 2 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Detects whether a person has pneumonia or not based on a chest X-ray ; Has an accuracy of 98+ .☆19Jul 7, 2020Updated 5 years ago
- Code repository for controller, vision, and path planning code for the following simulated mobile robot (http://bit.ly/1bD0sgJ).☆11Apr 7, 2014Updated 11 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Experiments on Data Poisoning Regression Learning☆12Oct 5, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Implementation of Boundary Attributions for Normal (Vector) Explanations