duoergun0729 / adversarial_examples
对抗样本
☆263Updated last year
Related projects ⓘ
Alternatives and complementary repositories for adversarial_examples
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆107Updated 5 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- ☆79Updated 5 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆264Updated 3 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆157Updated 2 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆55Updated 5 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆243Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆122Updated 3 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆274Updated last month
- 对抗样本基础☆8Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆40Updated last year
- Simple pytorch implementation of FGSM and I-FGSM☆276Updated 6 years ago
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆267Updated 4 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Updated 4 years ago
- ☆43Updated 3 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆91Updated 2 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 5 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,387Updated last year
- An adversarial attack on object detectors☆140Updated 3 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆92Updated 3 years ago
- 面向目标检测的对抗样本攻击☆20Updated 3 years ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆11Updated 4 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆483Updated last year
- Paper list of Adversarial Examples☆43Updated last year
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆64Updated 5 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆87Updated last year
- Adversarial Attacks and Defenses of Image Classifiers, NIPS 2017 competition track☆45Updated 7 years ago