A PyTorch Implementation of the UAP attack
☆19Dec 31, 2018Updated 7 years ago
Alternatives and similar repositories for Universal_Adversarial_Perturbation_pytorch
Users that are interested in Universal_Adversarial_Perturbation_pytorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Jul 15, 2019Updated 6 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆46Apr 16, 2019Updated 7 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆66Nov 23, 2019Updated 6 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆14Jan 6, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆52Mar 3, 2022Updated 4 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- ☆18Jan 12, 2022Updated 4 years ago
- Tensorflow code for Sparse Adversarial Perturbations for Videos☆23Mar 8, 2019Updated 7 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池 黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Oct 24, 2021Updated 4 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆34Jun 17, 2022Updated 3 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Mar 16, 2022Updated 4 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆20Oct 9, 2020Updated 5 years ago
- Python code to calculate the Mel-frequency Cepstral coefficients (MFCC) and used K-Nearest neighbor comparing with the training set to c…☆10Mar 5, 2014Updated 12 years ago
- Universal Adversarial Perturbations based on the (p, q)-singular vectors.☆12Jan 8, 2018Updated 8 years ago
- ☆12Mar 29, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A program that tracks the ball and estimates the shot location of a basketball shot.☆11May 21, 2019Updated 6 years ago
- the paper "Geometry-aware Instance-reweighted Adversarial Training" ICLR 2021 oral☆59Apr 13, 2021Updated 5 years ago
- AAAI2020 - Learning 2D Temporal Localization Networks for Moment Localization with Natural Language☆18Dec 10, 2019Updated 6 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- ☆60Apr 22, 2022Updated 4 years ago
- Personal xv6 branch.☆14Feb 11, 2014Updated 12 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- A PyTorch implementation of Cutout☆17Jun 2, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Implementation of "Neural Jump-Diffusion Temporal Point Processes" (ICML 2024 Spotlight)☆18Jul 18, 2025Updated 9 months ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆132Apr 4, 2023Updated 3 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆32Apr 28, 2022Updated 4 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 4 years ago