It turns out that adversarial and clean data are not twins, not at all.
☆18Apr 19, 2017Updated 9 years ago
Alternatives and similar repositories for adversarial-classifier
Users that are interested in adversarial-classifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MagNet: a Two-Pronged Defense against Adversarial Examples☆102Oct 13, 2018Updated 7 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- Crafting adversarial images☆222Jan 3, 2019Updated 7 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- 5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)☆10Nov 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python implementation of the kernel two-samples test as in Gretton et al 2012 (JMLR).☆33Apr 21, 2016Updated 9 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆63Feb 25, 2018Updated 8 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆48May 14, 2021Updated 4 years ago
- ☆19Mar 24, 2023Updated 3 years ago
- Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder(CVPR2020)☆12Aug 25, 2020Updated 5 years ago
- Image search based on convolutional neural network feature extraction.☆14May 11, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Trading bot for cryptocurrencies with recurrent neural networks.☆10Mar 24, 2015Updated 11 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- ☆11Sep 20, 2019Updated 6 years ago
- ☆11Oct 15, 2020Updated 5 years ago
- Generate adversarial text via gradient methods☆30Mar 16, 2019Updated 7 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- Some of my experiments targeting adversarial instances☆12May 7, 2017Updated 8 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Capstone Project: Reversing Image Redaction with Deep Learning☆12Nov 18, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Detecting Adversarial Examples in Deep Neural Networks☆70Mar 19, 2018Updated 8 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Using Reinforcement learning for object detection & localization CPTS_580 Project☆12May 4, 2017Updated 8 years ago
- Differentially private learning on distributed data (NIPS 2017)☆12Dec 5, 2017Updated 8 years ago
- Code for our paper Self-supervised Learning for Sonar Image Classification [CVPR 2022]☆39Jun 28, 2022Updated 3 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Mar 4, 2019Updated 7 years ago
- AutoBib: create beautiful bib files and html publication pages automagically☆14May 7, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The purpose of Raster Fairy is to transform any kind of 2D point cloud into a regular raster whilst trying to preserve the neighborhood r…☆13Apr 18, 2017Updated 9 years ago
- Detecting important corners in images and real-time video using Harris Corner Detector. and Shi-tomasi corner Detector☆16Jul 23, 2018Updated 7 years ago
- A very simple variant of adversarial training that yields excellent results on MNIST☆12Mar 19, 2016Updated 10 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11May 1, 2017Updated 8 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- ☆12Jun 8, 2017Updated 8 years ago
- Dataset and Code for our CVPR'18 paper ST-CGAN: "Stacked Conditional Generative Adversarial Networks for Jointly Learning Shadow Detectio…☆13Apr 17, 2018Updated 8 years ago