Creating and defending against adversarial examples
☆41Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for adversarial
Users that are interested in adversarial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Code for "Robustness May Be at Odds with Accuracy"☆90Mar 24, 2023Updated 3 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 8 years ago
- Convex Layerwise Adversarial Training (COLT)☆29Jan 13, 2021Updated 5 years ago
- Overcoming Catastrophic Forgetting by Incremental Moment Matching (IMM)☆35Dec 27, 2017Updated 8 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆85Feb 18, 2021Updated 5 years ago
- A Closer Look at Accuracy vs. Robustness☆87May 17, 2021Updated 4 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆762May 3, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Adversarial Ranking Attack and Defense, ECCV, 2020.☆24Sep 16, 2021Updated 4 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211May 27, 2022Updated 3 years ago
- Repository of code for the experiments for the ICLR submission "An Empirical Investigation of Catastrophic Forgetting in Gradient-Based N…☆69Apr 10, 2014Updated 12 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆53Jan 7, 2022Updated 4 years ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated last year
- Adversarial attack methods, FGSM and TGSM, implemented in Chainer☆15Jul 7, 2017Updated 8 years ago
- ☆14May 13, 2022Updated 3 years ago
- Official Repository for "Modeling Hierarchical Structures with Continuous Recursive Neural Networks" (ICML 2021)☆12Aug 18, 2021Updated 4 years ago
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- Code for the paper "Reactive Exploration to Cope with Non-Stationarity in Lifelong Reinforcement Learning"☆16Jul 4, 2022Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆17Oct 29, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Model-based Hindsight Experience Replay☆10Jun 8, 2022Updated 3 years ago
- This implements a linear SVM using fully-connected layer and hinge loss using PyTorch.☆10Jan 2, 2025Updated last year
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 10 months ago
- ☆16Mar 9, 2023Updated 3 years ago
- ☆10Apr 26, 2020Updated 6 years ago
- Learning to Hash for Maximum Inner Product Search☆12Jan 21, 2022Updated 4 years ago
- 257-way Image Classification using Fully Connected Neural Network, Convolutional Neural Network built from scratch and Transfer Learning☆15Feb 9, 2018Updated 8 years ago