enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)
☆12Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for Gradient-Adversarial-Transformation-Network
Users that are interested in Gradient-Adversarial-Transformation-Network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Circumventing the defense in "Ensemble Adversarial Training: Attacks and Defenses"☆38Feb 19, 2018Updated 8 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- CAAD 2018 winning submissions☆34Feb 10, 2019Updated 7 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- All the details for our UAVs Jammming Detection project☆12Feb 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Fast Image Restoration with Multi-bin Trainable Linear Units.☆11Dec 23, 2019Updated 6 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- Alexa prompts the user how his/her day is going, then depending on the sentiment expressed by the user, it produces a list of regularly-u…☆19Jun 26, 2017Updated 8 years ago
- A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning☆12Dec 17, 2019Updated 6 years ago
- Try Openmax with MNIST Fashion dataset☆11Jul 22, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains the dataset developed in paper, "Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles."☆21Feb 2, 2024Updated 2 years ago
- Spatiotemporal propagation network for airport delay prediction☆21Mar 9, 2023Updated 3 years ago
- Code for the paper "Adversarial Attacks Against Medical Deep Learning Systems"☆67Apr 25, 2019Updated 6 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- ☆35May 29, 2024Updated last year
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- This is the official implementation of the paper: Generalized Real-World Super-Resolution through Adversarial Robustness.☆16Dec 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Sep 22, 2023Updated 2 years ago
- ☆12Apr 27, 2022Updated 3 years ago
- Training Deep Neural Networks via Direct Loss Minimization☆17Oct 24, 2021Updated 4 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆44Feb 7, 2019Updated 7 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- LSTM network generating lyrics☆21Dec 4, 2016Updated 9 years ago