Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks
☆44Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for AdvGAN-tf
Users that are interested in AdvGAN-tf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 3, 2020Updated 5 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 3 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆760May 3, 2022Updated 3 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Jun 15, 2022Updated 3 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Nov 8, 2020Updated 5 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆137Dec 16, 2020Updated 5 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- An efficient adversarial defense method with strong insights which won the fifth place of the IJCAI-2019 Alibaba Adversarial AI Challen…☆12Oct 25, 2019Updated 6 years ago
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆12Jun 18, 2019Updated 6 years ago
- Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)☆111Mar 25, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Implementation of Adversarial Multi-Distillation for Automatic Modulation Recognition Models.☆27Nov 2, 2023Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆247Oct 24, 2019Updated 6 years ago
- ☆26Mar 24, 2023Updated 3 years ago
- Generating Natural Adversarial Examples, ICLR 2018☆142May 17, 2018Updated 7 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- ☆18Jan 12, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆253Oct 30, 2019Updated 6 years ago
- GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification☆15Mar 25, 2023Updated 3 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Adversarial Examples for Semantic Segmentation and Object Detection☆126Jan 30, 2018Updated 8 years ago
- CNN-based fast source device identification☆24Sep 5, 2022Updated 3 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 3 months ago