ferjad / Universal_Adversarial_Perturbation_pytorchView external linksLinks
A PyTorch Implementation of the UAP attack
☆19Dec 31, 2018Updated 7 years ago
Alternatives and similar repositories for Universal_Adversarial_Perturbation_pytorch
Users that are interested in Universal_Adversarial_Perturbation_pytorch are comparing it to the libraries listed below
Sorting:
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- ☆18Jan 12, 2022Updated 4 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Mar 16, 2022Updated 3 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 6 years ago
- The most up-to-date list of Turkish ads to block ads on Turkish websites☆19Dec 12, 2025Updated 2 months ago
- R Ultimate 2023 - R for Data Science and Machine Learning, by Packt Publishing☆15Dec 15, 2025Updated last month
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆10Jul 18, 2021Updated 4 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Learning Scala Programming, published by Packt☆11Jan 30, 2023Updated 3 years ago
- Machine learning based credit risk prediction system☆27Nov 18, 2025Updated 2 months ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆10Feb 5, 2025Updated last year
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated last year
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- ☆12Feb 23, 2022Updated 3 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- Türkçe Sahte Kişi/Kimlik/İsim Oluşturucu☆15Nov 10, 2020Updated 5 years ago
- ☆10Sep 25, 2019Updated 6 years ago
- Anomaly detection with GAN+RL☆11Jan 12, 2019Updated 7 years ago
- Awesome-Adversarial-Attack-Methods-Summary☆12Jul 24, 2024Updated last year
- ☆12May 10, 2023Updated 2 years ago
- Building CricketPrediction model using Machine Learning☆14Oct 17, 2023Updated 2 years ago
- This repository contains an implementation for design patterns detection. In this task, feature engineering and ensemble learning are app…☆10Jul 30, 2022Updated 3 years ago
- 📘 This repo is full of sample functions to learn common C programming routines. From string operations to math, file I/O to array manipu…☆10May 1, 2024Updated last year
- ☆14Jun 13, 2022Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 2 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- ☆10Mar 24, 2022Updated 3 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- Streamlit Cookbook, published by Packt☆14Jun 6, 2025Updated 8 months ago