Implement adversarial arrack on Recurrent Neural network built to perform sentiment analysis with LSTM using TensorFlow
☆21Oct 6, 2018Updated 7 years ago
Alternatives and similar repositories for Adversarial-Attack-on-Recurrent-Neural-Network
Users that are interested in Adversarial-Attack-on-Recurrent-Neural-Network are comparing it to the libraries listed below
Sorting:
- Performing C&W attack on Recurrent Neural Network☆12Sep 26, 2018Updated 7 years ago
- This project proposed a method to defense against adversarial attack. By combining the proposed preprocessing method with an adversariall…☆10Oct 4, 2018Updated 7 years ago
- Concealed Data Poisoning Attacks on NLP Models☆21Sep 4, 2023Updated 2 years ago
- PyTorch Implemetations of Adversarial Examples☆19Jun 25, 2018Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Source Code for ICRL 2018 Paper: PixelDefend: Leveraging Generative Models to Understand and Defend against Adversarial Examples☆26Feb 6, 2020Updated 6 years ago
- ☆26Jan 25, 2019Updated 7 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Jan 7, 2022Updated 4 years ago
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Mar 28, 2020Updated 5 years ago
- ☆21Nov 12, 2025Updated 3 months ago
- ☆12Dec 22, 2025Updated 2 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Tool for testing IPv4 and IPv6 DHCP services☆13Mar 27, 2020Updated 5 years ago
- Partially Non-Autoregressive Image Captioning☆10Sep 30, 2021Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Oct 3, 2023Updated 2 years ago
- ☆13Updated this week
- ☆11Mar 13, 2023Updated 2 years ago
- Heterogeneous Model Reuse via Optimizing Multiparty Multiclass Margin☆11Jan 15, 2020Updated 6 years ago
- ☆12Apr 22, 2024Updated last year
- Implementation of joint bayesian model, written in python.☆11Aug 2, 2021Updated 4 years ago
- ☆19May 14, 2025Updated 9 months ago
- IMAGE ANONYMIZATION DETECTION WITH DEEP HANDCRAFTED FEATURES (ICIP 2019)☆10Sep 10, 2019Updated 6 years ago
- An MLIR-based compiler from C/C++ to AMD-Xilinx Versal AIE☆17Aug 5, 2022Updated 3 years ago
- This is the code of our work CISS Certified Robustness Against Natural Language Attacks by Causal Intervention published on ICML 2022☆11Dec 6, 2022Updated 3 years ago
- 华为集合通信性能测试☆15May 27, 2024Updated last year
- Measure the diversity of image descriptions, repository for our COLING 2018 paper.☆13Dec 29, 2019Updated 6 years ago
- [ISCA'25] LIA: A Single-GPU LLM Inference Acceleration with Cooperative AMX-Enabled CPU-GPU Computation and CXL Offloading☆13Jun 28, 2025Updated 8 months ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- Simulation of 802.11 DCF MAC protocol and 802.11 with RTS/CTS☆12Nov 21, 2017Updated 8 years ago
- 1-step Q Learning from the paper "Asynchronous Methods for Deep Reinforcement Learning"☆12Mar 13, 2017Updated 8 years ago
- Started as a Team Project for CS690D at UMass Amherst, now turning into pytorch implementation of hyperbolic neural networks using Poinca…☆12Dec 8, 2022Updated 3 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆46Nov 25, 2019Updated 6 years ago
- ☆13Jun 5, 2024Updated last year
- Hand Gesture Recognition-opencv☆12Jul 10, 2016Updated 9 years ago
- 这里收录比较实用的计算机相关技术书籍,可以在短期之内入门的简单实用教程、一些技术网站以及一些写的比较好的博文,欢迎Fork,你也可以通过Pull Request参与编辑。☆10Jul 21, 2016Updated 9 years ago
- Code for "Live Trojan Attacks on Deep Neural Networks" paper☆10May 8, 2020Updated 5 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- macOS 提高输入效率:输入法文本替换列表、Alfred Snippets☆14Jul 18, 2024Updated last year