enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)
☆12Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for Gradient-Adversarial-Transformation-Network
Users that are interested in Gradient-Adversarial-Transformation-Network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆13Feb 28, 2024Updated 2 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Oct 4, 2018Updated 7 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 8 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- 一个可以直观的看出两张图片区别的组件☆11May 18, 2019Updated 6 years ago
- Fast Image Restoration with Multi-bin Trainable Linear Units.☆11Dec 23, 2019Updated 6 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Oct 20, 2019Updated 6 years ago
- Alexa prompts the user how his/her day is going, then depending on the sentiment expressed by the user, it produces a list of regularly-u…☆19Jun 26, 2017Updated 8 years ago
- Try Openmax with MNIST Fashion dataset☆11Jul 22, 2018Updated 7 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- ☆36May 29, 2024Updated last year
- Evaluation codes of "From Images to Textual Prompts: Zero-shot VQA with Frozen Large Language Models".☆16May 15, 2023Updated 2 years ago
- object detection, adversarial robustness, ICIP2021☆17Jan 10, 2021Updated 5 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- This is the official implementation of the paper: Generalized Real-World Super-Resolution through Adversarial Robustness.☆16Dec 24, 2021Updated 4 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- ☆12Apr 27, 2022Updated 3 years ago
- Real or Fake Text? Evaluation criteria for human-written and computer-generated text through the gamification of annotation. Published in…☆11Dec 22, 2022Updated 3 years ago
- Training Deep Neural Networks via Direct Loss Minimization☆17Oct 24, 2021Updated 4 years ago
- Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow☆21Oct 6, 2018Updated 7 years ago
- Is Neuron Coverage a Meaningful Measure for Testing Deep Neural Networks? (FSE 2020)☆10Sep 23, 2021Updated 4 years ago
- A pytorch implemention of the Explainable AI work 'Contrastive layerwise relevance propagation (CLRP)'☆17Jun 24, 2022Updated 3 years ago
- It is the official code of the AAAI-24 paper "Invisible Backdoor Attack against 3D Point Cloud Classifier in Graph Spectral Domain"☆17Oct 11, 2025Updated 5 months ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- ☆20Apr 25, 2023Updated 2 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 5 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 3 years ago