jiaruncao / adversial_example_defenseLinks
对抗性样本攻击与防御
☆204Updated 7 years ago
Alternatives and similar repositories for adversial_example_defense
Users that are interested in adversial_example_defense are comparing it to the libraries listed below
Sorting:
- A list of awesome resources for adversarial attack and defense method in deep learning☆134Updated 2 years ago
- 机器学习安全相关论文、代码☆42Updated 6 years ago
- ☆79Updated 5 years ago
- 对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料☆117Updated 6 years ago
- This is an ongoing re-implementation of DeepLab_v3_plus on pytorch which is trained on VOC2012 and use ResNet101 for backbone.☆88Updated 6 years ago
- Audio steganalysis based on traditional handcrafted features design.☆36Updated 6 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆251Updated 5 years ago
- tools for evaluating and comparing performances of GAN performances w.r.t. different metrics; metric evolution at each epoch supported☆35Updated 6 years ago
- 对抗样本☆268Updated 2 years ago
- A Keras implementation for AAAI 2018 SFCN-OPI: Detection and Fine-grained Classification of Nuclei Using Sibling FCN with Objectness Prio…☆95Updated 2 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆272Updated 4 years ago
- 作为一个学习党,你还总是被室友的打游戏的机械键盘声音吵到么,你还总是被室友在游戏里要被杀死的绝望叫声所震撼么,你还被室友输了游戏以后久久不能释怀的喃喃自语所心烦么?不要犹豫了,点进来!点一下,你点不到吃亏;点一下,你点不到上当!来吧朋友,让我们还你一片没有小学生的蓝天!☆178Updated 6 years ago
- DES、AES、Present、Extended Euclidean Algorithm、Miller-Rabin( 常用密码学算法)推荐书籍《现代密码学趣味之旅》---彭长根☆169Updated 5 years ago
- Algorithm (C / C++)☆16Updated 6 years ago
- A technique I proposed and implemented for training DEEP neural networks on SMALL datasets; effectively avoids overfitting and gradient v…☆39Updated 6 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 6 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆289Updated 7 years ago
- 日常代码爬虫、gui小工具等☆59Updated 7 years ago
- Implementation of Papers on Adversarial Examples☆397Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Updated 4 years ago
- Modification of Github_Nuggests based on @az0ne,Thanks! This script full support for Python3.0☆39Updated 7 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆133Updated 7 years ago
- Code for Semantic Adversarial Attacks☆11Updated 3 years ago
- 观风大数据平台☆50Updated 6 years ago
- HySAS(Hydrogen Situation Awareness System )是一个安全态势感知系统的开发框架,用于实现多进程多数据源的实时计算。不管是在开发过程 还是运行过程中,都拥有极高的并行性和扩展性。☆157Updated 3 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Updated 2 years ago
- Audio steganalysis with tensorflow.☆361Updated last year
- DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model☆217Updated 6 years ago
- py2so is tool to change the .py to .so, you can use it to hide the source code of py [Deprecated]. Please navigate to Py2sec☆142Updated 5 years ago
- Custom made variant of DCGAN; added Mute Layers (as opposed to Dropout) for better performance with citrus canker image classification ta…☆10Updated 6 years ago