enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)
☆12Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for Gradient-Adversarial-Transformation-Network
Users that are interested in Gradient-Adversarial-Transformation-Network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Circumventing the defense in "Ensemble Adversarial Training: Attacks and Defenses"☆38Feb 19, 2018Updated 8 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Tensorflow Implementation of adversarial learning based adversarial example generator☆10Jan 31, 2018Updated 8 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- 一个可以直观的看出两张图片区别的组件☆11May 18, 2019Updated 6 years ago
- Fast Image Restoration with Multi-bin Trainable Linear Units.☆11Dec 23, 2019Updated 6 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 7 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- Try Openmax with MNIST Fashion dataset☆11Jul 22, 2018Updated 7 years ago
- Code for the paper "Adversarial Attacks Against Medical Deep Learning Systems"☆67Apr 25, 2019Updated 7 years ago
- PyTorch implementation of the paper "Finding Berries: Segmentation and Counting of Cranberries using Point Supervision and Shape Priors".…☆15Dec 6, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Pytorch implementation of "Attention-Based Spatial Guidance for Image-to-Image Translation" (WACV 2021)☆16Jun 3, 2021Updated 4 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- This is the official implementation of the paper: Generalized Real-World Super-Resolution through Adversarial Robustness.☆16Dec 24, 2021Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ☆12Apr 27, 2022Updated 4 years ago
- Real or Fake Text? Evaluation criteria for human-written and computer-generated text through the gamification of annotation. Published in…☆12Dec 22, 2022Updated 3 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- [OPEN SOURCE Digital Forensics Tool] - State of the Art Image/Video Forensics Tool : Hybrid-G-PRNU-Extractor based on the work of Muammar…☆12May 6, 2020Updated 5 years ago
- A pytorch implemention of the Explainable AI work 'Contrastive layerwise relevance propagation (CLRP)'☆17Jun 24, 2022Updated 3 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- ☆15Sep 2, 2020Updated 5 years ago
- Robust Adversarial Objects against Deep Learning Models☆11Mar 28, 2020Updated 6 years ago
- Code and data for PAN and PAN-phys.☆14Mar 20, 2023Updated 3 years ago