Deflecting Adversarial Attacks with Pixel Deflection
☆71Jun 21, 2018Updated 7 years ago
Alternatives and similar repositories for pixel-deflection
Users that are interested in pixel-deflection are comparing it to the libraries listed below
Sorting:
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 7 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Jan 17, 2019Updated 7 years ago
- Code for our CVPR 2018 paper, "On the Robustness of Semantic Segmentation Models to Adversarial Attacks"☆103Mar 8, 2019Updated 6 years ago
- Mitigating Adversarial Effects Through Randomization☆120Mar 20, 2018Updated 7 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆137Nov 25, 2020Updated 5 years ago
- Code for "Adversarial Defense by Stratified Convolutional Sparse Coding"☆19Jul 27, 2019Updated 6 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength☆38Feb 15, 2020Updated 6 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Feb 25, 2018Updated 8 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- ImageNet classifier with state-of-the-art adversarial robustness☆685Dec 31, 2019Updated 6 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Datasets for the paper "Adversarial Examples are not Bugs, They Are Features"☆187Sep 17, 2020Updated 5 years ago
- ☆21Jul 16, 2019Updated 6 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Apr 30, 2021Updated 4 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- Training multi resolution GAN using MsCeleb datasets.☆12May 2, 2018Updated 7 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- a list of recent papers on transfer learning☆24Dec 5, 2017Updated 8 years ago
- Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX …☆19Nov 28, 2018Updated 7 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆167Jan 13, 2020Updated 6 years ago
- Pytorch implementation of "Hallucinating Agnostic Images to Generalize Across Domains"☆11Jul 10, 2019Updated 6 years ago
- ☆10Jan 25, 2021Updated 5 years ago
- Hybrid Binary Networks: Optimizing for Accuracy, Efficiency and Memory - WACV18☆12Jul 5, 2019Updated 6 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- A simple tool to encrypt caffe model to deploy☆13Oct 25, 2018Updated 7 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆47May 14, 2021Updated 4 years ago
- Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)☆246Oct 24, 2019Updated 6 years ago
- For Competition on Adversarial Attacks and Defenses 2018☆40Jan 4, 2019Updated 7 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- Implementation of (2014) Explaining and Harnessing Adversarial Examples.☆11Jul 30, 2020Updated 5 years ago
- Code for "Detecting Adversarial Samples from Artifacts" (Feinman et al., 2017)☆111Feb 14, 2018Updated 8 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Nov 3, 2018Updated 7 years ago
- ☆26Feb 15, 2023Updated 3 years ago