It turns out that adversarial and clean data are not twins, not at all.
☆18Apr 19, 2017Updated 8 years ago
Alternatives and similar repositories for adversarial-classifier
Users that are interested in adversarial-classifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- Adversarial Workshop code and presentation☆38Oct 20, 2016Updated 9 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Crafting adversarial images☆222Jan 3, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Pytorch Implementation of APE-GAN☆15Oct 29, 2017Updated 8 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- A python implementation of the kernel two-samples test as in Gretton et al 2012 (JMLR).☆33Apr 21, 2016Updated 9 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆63Feb 25, 2018Updated 8 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 4 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Aug 25, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Image search based on convolutional neural network feature extraction.☆14May 11, 2018Updated 7 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- DiffSinger: Singing Voice Synthesis via Shallow Diffusion Mechanism (SVS & TTS); AAAI 2022; Official code☆10Mar 8, 2022Updated 4 years ago
- Adversarial Image Perturbation for Privacy Protection -- A Game Theory Perspective, ICCV'17☆30Sep 15, 2018Updated 7 years ago
- Trading bot for cryptocurrencies with recurrent neural networks.☆10Mar 24, 2015Updated 11 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- PyTorch project example for DL-DIY course at Ecole Polytechnique☆12Feb 25, 2020Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Sep 20, 2019Updated 6 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆88Jan 17, 2019Updated 7 years ago
- ☆10Apr 6, 2018Updated 7 years ago
- Geometric Certifications of Neural Nets☆42Nov 22, 2022Updated 3 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Crack Geetest V3☆12Dec 12, 2019Updated 6 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Using Reinforcement learning for object detection & localization CPTS_580 Project☆12May 4, 2017Updated 8 years ago
- Differentially private learning on distributed data (NIPS 2017)☆12Dec 5, 2017Updated 8 years ago
- Code for our paper Self-supervised Learning for Sonar Image Classification [CVPR 2022]☆39Jun 28, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago