coallaoh / AIP
Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17
☆28Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for AIP
- reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch☆16Updated 6 years ago
- NIPS 2017 Adversarial Competition in PyTorch☆13Updated 6 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- ☆29Updated 5 years ago
- This github repository contains the official code for the paper, "Evolving Robust Neural Architectures to Defend from Adversarial Attacks…☆18Updated 10 months ago
- Deflecting Adversarial Attacks with Pixel Deflection☆69Updated 6 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆46Updated last year
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆54Updated last year
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Updated 6 years ago
- Code for ICCV2019 paper《Adversarial Learning with Margin-based Triplet Embedding Regularization》☆28Updated 5 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆88Updated 5 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Updated 7 years ago
- Data independent universal adversarial perturbations☆61Updated 4 years ago
- ☆18Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 4 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13Updated 6 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆61Updated 4 years ago
- Official PyTorch implementation for our ICCV 2019 paper - Fooling Network Interpretation in Image Classification☆24Updated 4 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- ☆23Updated 5 years ago
- Implementation of the Deep Frank-Wolfe Algorithm -- Pytorch☆61Updated 3 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆37Updated 6 years ago
- ☆66Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 4 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆19Updated 7 years ago
- ☆46Updated 3 years ago
- ☆13Updated 5 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆21Updated 3 years ago