Adversarial Examples: Attacks and Defenses for Deep Learning
☆31Apr 26, 2018Updated 7 years ago
Alternatives and similar repositories for adversarial-examples
Users that are interested in adversarial-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Code used for the VS265 - Neural computation fall 2014 final project☆14Jun 11, 2015Updated 10 years ago
- Creating and defending against adversarial examples☆41Jan 6, 2019Updated 7 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- ☆11Nov 13, 2020Updated 5 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- Measure the diversity of image descriptions, repository for our COLING 2018 paper.☆13Dec 29, 2019Updated 6 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- ☆16Dec 17, 2018Updated 7 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago
- A Python implementation of the Viterbi Algorithm with Bigram Hidden Markov Model(HMM) taggers for predicting Parts of Speech(POS) tags. -…☆12Feb 9, 2016Updated 10 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- This repository contains implementation of 4 adversarial attacks : FGSM, Basic Iterative Method, Projected Gradient Descent(Madry's Attac…☆32Dec 7, 2018Updated 7 years ago
- A Caffe version of official PyTorch ResNeSt☆27Jul 3, 2020Updated 5 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Collection of tensorflow notebooks tutorials for implementing some basic Deep Learning architectures.☆28Aug 15, 2018Updated 7 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- Emotion Recognition☆10Oct 22, 2017Updated 8 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Code and slides for the 2-day TensorFlow training at OSCON 2017 https://conferences.oreilly.com/oscon/oscon-tx/public/schedule/detail/578…☆27Jun 27, 2017Updated 8 years ago
- This is the code for semi-supervised robust training (SRT).☆18Mar 24, 2023Updated 2 years ago
- Learning Cascaded Convolutional Networks for Blind Single Image Super-Resolution☆21Jul 15, 2020Updated 5 years ago
- Implementation of soft parameter sharing for neural networks☆70Dec 15, 2020Updated 5 years ago
- [SIGMETRICS 2022] One Proxy Device Is Enough for Hardware-Aware Neural Architecture Search☆13Nov 3, 2021Updated 4 years ago
- 网络安全工作做使用到的工具、插件☆23Mar 8, 2022Updated 4 years ago
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 7 months ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- [ECCV18] Constraint-Aware Deep Neural Network Compression☆12Sep 11, 2018Updated 7 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- A collection of papers and libraries for performing multi-agent optimization☆18Feb 7, 2026Updated last month
- implement Kervolutional Neural Networks (CVPR, 2019) and compare with CNN under the white box attack☆12May 20, 2019Updated 6 years ago
- This is a python repo for flattening Verilog☆20Dec 19, 2025Updated 3 months ago
- An approach to a blind discrete Wavelet Transformation (DWT) domain feature point based image watermarking technique is proposed in this …☆19Dec 23, 2014Updated 11 years ago