A PyTorch Implementation of the UAP attack
☆19Dec 31, 2018Updated 7 years ago
Alternatives and similar repositories for Universal_Adversarial_Perturbation_pytorch
Users that are interested in Universal_Adversarial_Perturbation_pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆65Nov 23, 2019Updated 6 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆52Mar 3, 2022Updated 4 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- ☆18Jan 12, 2022Updated 4 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks☆15Apr 2, 2019Updated 7 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- Python code to calculate the Mel-frequency Cepstral coefficients (MFCC) and used K-Nearest neighbor comparing with the training set to c…☆10Mar 5, 2014Updated 12 years ago
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- ☆12Mar 29, 2021Updated 5 years ago
- A program that tracks the ball and estimates the shot location of a basketball shot.☆11May 21, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- Ultra-light MIR models with a structured lottery ticket hypothesis approach☆13Sep 21, 2020Updated 5 years ago
- ☆60Apr 22, 2022Updated 3 years ago
- Personal xv6 branch.☆14Feb 11, 2014Updated 12 years ago
- A PyTorch implementation of Cutout☆17Jun 2, 2018Updated 7 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆32Apr 28, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆12Feb 5, 2025Updated last year
- ☆14Oct 21, 2021Updated 4 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- ☆14Mar 5, 2026Updated last month