duoergun0729 / adversarial_examples
对抗样本
☆263Updated last year
Related projects ⓘ
Alternatives and complementary repositories for adversarial_examples
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆106Updated 5 years ago
- 机器学习安全相关论文、代码☆41Updated 5 years ago
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆209Updated 5 years ago
- Simple PyTorch implementations of Badnets on MNIST and CIFAR10.☆154Updated 2 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆54Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆120Updated 3 years ago
- ☆79Updated 5 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆260Updated 3 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆483Updated last year
- ☆42Updated 3 years ago
- 对抗样本基础☆8Updated 2 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆243Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 5 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆273Updated 6 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆262Updated 2 weeks ago
- An adversarial attack on object detectors☆140Updated 3 years ago
- Paper list of Adversarial Examples☆43Updated last year
- 面向目标检测的对抗样本攻击☆20Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆40Updated last year
- Code implementation of the paper "Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks", at IEEE Security and P…☆266Updated 4 years ago
- 使用pytorch实现FGSM☆29Updated 3 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆91Updated 3 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆87Updated last year
- ☆71Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated 5 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆64Updated 5 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Updated 4 years ago
- This is the source code for Data-free Backdoor. Our paper is accepted by the 32nd USENIX Security Symposium (USENIX Security 2023).☆31Updated last year
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆121Updated last year
- Invisible Backdoor Attack with Sample-Specific Triggers☆88Updated 2 years ago