nebula-beta / awesome-adversarial-deep-learning
A list of awesome resources for adversarial attack and defense method in deep learning
☆131Updated 2 years ago
Alternatives and similar repositories for awesome-adversarial-deep-learning:
Users that are interested in awesome-adversarial-deep-learning are comparing it to the libraries listed below
- cnn pruning with tensorflow.☆99Updated 5 years ago
- 对抗性样本攻击与防御☆201Updated 6 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆223Updated 5 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- 🔥🔥A pytorch implementation of Dynamic Convolutional Layer in Dynamic Conditional Convolutional Network for Few-Shot Learning🔥🔥☆154Updated 3 years ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆19Updated 5 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆153Updated 4 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆55Updated 5 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211Updated 2 years ago
- A curated list of awesome adversarial attack and defense papers☆41Updated 4 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆134Updated 4 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆88Updated last year
- Generative Adversarial Perturbations (CVPR 2018)☆137Updated 4 years ago
- Empirical tricks for training robust models (ICLR 2021)☆253Updated last year
- Generalized Data-free Universal Adversarial Perturbations☆69Updated 6 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆144Updated 4 years ago
- A rich-documented PyTorch implementation of Carlini-Wagner's L2 attack.☆60Updated 6 years ago
- ☆63Updated 3 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆150Updated 5 years ago
- Implementation of OctaveConv in Tensorflow (https://arxiv.org/abs/1904.05049)☆88Updated 4 years ago
- ☆83Updated 3 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Updated last year
- Facenet implemented by tensorflow2.0-keras api and in eager-mode support CenterLoss, LSoftmaxLoss, L2SoftmaxLoss, AMSoftmaxLoss, ASoftm…☆119Updated 2 years ago
- Defending Against Physically Realizable Attacks on Image Classification☆33Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆93Updated 4 years ago
- Blackbox attacks for deep neural network models☆70Updated 6 years ago
- Data independent universal adversarial perturbations☆61Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- Adversarial Defense for Ensemble Models (ICML 2019)☆61Updated 4 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 3 years ago