Crafting adversarial images
☆222Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for tensorflow-adversarial
Users that are interested in tensorflow-adversarial are comparing it to the libraries listed below
Sorting:
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- Robust evasion attacks against neural network to find adversarial examples☆860Jun 1, 2021Updated 4 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆6,418Apr 10, 2024Updated last year
- ☆48Feb 9, 2021Updated 5 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆758May 3, 2022Updated 3 years ago
- A simple and accurate method to fool deep neural networks☆361Mar 31, 2020Updated 5 years ago
- ☆248Jan 12, 2019Updated 7 years ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,943Dec 3, 2025Updated 3 months ago
- Tensorflow Implementation of Adversarial Attack to Capsule Networks☆173Nov 9, 2017Updated 8 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆170Aug 3, 2021Updated 4 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆553Mar 30, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 7 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆506Aug 30, 2021Updated 4 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Jun 1, 2024Updated last year
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- Caffe code for the paper "Adversarial Manipulation of Deep Representations"☆17Nov 6, 2017Updated 8 years ago
- Attack InceptionV3 net using FGM( fast gradient method) and show saliency maps.☆13Nov 9, 2017Updated 8 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆253Oct 30, 2019Updated 6 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 2 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆71Jun 21, 2018Updated 7 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- Code for "Using Embeddings to Correct for Unobserved Confounding"☆10May 31, 2019Updated 6 years ago
- A method for training neural networks that are provably robust to adversarial attacks.☆391Feb 16, 2022Updated 4 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural trai…☆177May 3, 2024Updated last year
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Feb 25, 2018Updated 8 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Nov 3, 2018Updated 7 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago