It turns out that adversarial and clean data are not twins, not at all.
☆18Apr 19, 2017Updated 9 years ago
Alternatives and similar repositories for adversarial-classifier
Users that are interested in adversarial-classifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial Workshop code and presentation☆38Oct 20, 2016Updated 9 years ago
- Code for the Adversarial Image Detectors and a Saliency Map☆12Mar 23, 2017Updated 9 years ago
- Crafting adversarial images☆222Jan 3, 2019Updated 7 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A python implementation of the kernel two-samples test as in Gretton et al 2012 (JMLR).☆33Apr 21, 2016Updated 10 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆63Feb 25, 2018Updated 8 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 4 years ago
- ☆19Mar 24, 2023Updated 3 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆11Aug 25, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DiffSinger: Singing Voice Synthesis via Shallow Diffusion Mechanism (SVS & TTS); AAAI 2022; Official code☆10Mar 8, 2022Updated 4 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- PyTorch project example for DL-DIY course at Ecole Polytechnique☆12Feb 25, 2020Updated 6 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- A simple program that will take packets from a netfilter queue and alter their source or destination IP address☆12Mar 28, 2014Updated 12 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 9 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Apr 6, 2018Updated 8 years ago
- Tensorflow implementation of Generative Adversarial Text to Image Synthesis for MNIST handwritten digit dataset☆10Aug 3, 2017Updated 8 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆90Jan 17, 2019Updated 7 years ago
- Geometric Certifications of Neural Nets☆42Nov 22, 2022Updated 3 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 9 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Code for our paper Self-supervised Learning for Sonar Image Classification [CVPR 2022]☆40Jun 28, 2022Updated 3 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated last year
- (Unofficial) Code for the paper "Certifying Some Distributional Robustness with Principled Adversarial Training"☆13May 31, 2018Updated 7 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- A very simple variant of adversarial training that yields excellent results on MNIST☆12Mar 19, 2016Updated 10 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago