This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defense against all attacks using MNIST dataset.
☆138Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for Adversarial-Example-Attack-and-Defense
Users that are interested in Adversarial-Example-Attack-and-Defense are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆104Jul 8, 2021Updated 4 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆88Jan 17, 2019Updated 7 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove…☆21Mar 14, 2022Updated 4 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Aug 8, 2023Updated 2 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆253Oct 30, 2019Updated 6 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Simple pytorch implementation of FGSM and I-FGSM☆294Mar 21, 2018Updated 8 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,150Jun 29, 2024Updated last year
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Aug 18, 2020Updated 5 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆36Nov 28, 2023Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Dec 18, 2024Updated last year
- ☆13Nov 23, 2019Updated 6 years ago
- ☆28Jun 27, 2022Updated 3 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- SEAT☆21Oct 10, 2023Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- ☆28Dec 31, 2020Updated 5 years ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 5 months ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆760May 3, 2022Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211May 27, 2022Updated 3 years ago
- Pytorch Implementation of APE-GAN☆15Oct 29, 2017Updated 8 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Approximate convex decomposition(ACD)☆10Sep 9, 2023Updated 2 years ago
- ☆12Nov 18, 2025Updated 4 months ago