Adversarial Examples: Attacks and Defenses for Deep Learning
☆31Apr 26, 2018Updated 8 years ago
Alternatives and similar repositories for adversarial-examples
Users that are interested in adversarial-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆137Dec 17, 2020Updated 5 years ago
- Code used for the VS265 - Neural computation fall 2014 final project☆14Jun 11, 2015Updated 10 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211May 27, 2022Updated 3 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- ☆16Dec 17, 2018Updated 7 years ago
- Pure Python implementations of the language models for information retrieval surveyed here: https://dl.acm.org/doi/10.1145/383952.384019.☆13Dec 11, 2019Updated 6 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- A pastel coloured cv / resume template.☆14Dec 10, 2019Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Emotion Recognition☆10Oct 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Code and slides for the 2-day TensorFlow training at OSCON 2017 https://conferences.oreilly.com/oscon/oscon-tx/public/schedule/detail/578…☆27Jun 27, 2017Updated 8 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 3 years ago
- Implementation of soft parameter sharing for neural networks☆70Dec 15, 2020Updated 5 years ago
- Learning Cascaded Convolutional Networks for Blind Single Image Super-Resolution☆21Jul 15, 2020Updated 5 years ago
- Assignment codes for CS736 Algorithms for Medical Image Processing.☆10Aug 10, 2016Updated 9 years ago
- 网络安全工作做使用到的工具、插件☆24Mar 8, 2022Updated 4 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 9 years ago
- Adversarial attacks on Deep Reinforcement Learning (RL)☆100Feb 27, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Paper sharing in adversary related works☆46Apr 24, 2026Updated 3 weeks ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 4 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆168Jan 13, 2020Updated 6 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- A collection of papers and libraries for performing multi-agent optimization☆18Feb 7, 2026Updated 3 months ago
- KDD CUP 2020 ML Track 2 "Adversarial Attacks and Defense on Academic Graph": 1st Place Solution☆19Sep 29, 2020Updated 5 years ago
- implement Kervolutional Neural Networks (CVPR, 2019) and compare with CNN under the white box attack☆12May 20, 2019Updated 7 years ago
- ESANN20 paper code repository. This package is a perplexity-free extension of Parametric t-SNE dimensionality reduction method implemente…☆23Mar 24, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- ☆11Apr 5, 2021Updated 5 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆58Sep 4, 2019Updated 6 years ago
- Adversarial Attacks and Defenses of Image Classifiers, NIPS 2017 competition track☆44Oct 7, 2017Updated 8 years ago
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆28Oct 22, 2021Updated 4 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- Paper Code Learning Powerful Graph Neural Network Embeddings With Aid Of Transfer Learning☆41Dec 6, 2019Updated 6 years ago