Creating and defending against adversarial examples
☆41Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for adversarial
Users that are interested in adversarial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Mar 19, 2020Updated 6 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- Convex Layerwise Adversarial Training (COLT)☆29Jan 13, 2021Updated 5 years ago
- A Closer Look at Accuracy vs. Robustness☆88May 17, 2021Updated 4 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆759May 3, 2022Updated 3 years ago
- Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters☆13Aug 15, 2022Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- Repository of code for the experiments for the ICLR submission "An Empirical Investigation of Catastrophic Forgetting in Gradient-Based N…☆68Apr 10, 2014Updated 11 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- ☆16Dec 18, 2023Updated 2 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- EMG feature calculator for putEMG dataset☆10Jan 8, 2020Updated 6 years ago
- ☆53Jan 7, 2022Updated 4 years ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated 10 months ago
- ☆14May 13, 2022Updated 3 years ago
- ☆13Jun 4, 2025Updated 9 months ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆153Oct 15, 2020Updated 5 years ago
- Code for the paper "Reactive Exploration to Cope with Non-Stationarity in Lifelong Reinforcement Learning"☆14Jul 4, 2022Updated 3 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆17Oct 29, 2019Updated 6 years ago
- 六代兴亡如梦,苒苒惊时月。纵使岁寒途远,此志应难夺。☆11Mar 15, 2020Updated 6 years ago
- Model-based Hindsight Experience Replay☆10Jun 8, 2022Updated 3 years ago
- This implements a linear SVM using fully-connected layer and hinge loss using PyTorch.☆10Jan 2, 2025Updated last year
- [ICLR 2025] On Evluating the Durability of Safegurads for Open-Weight LLMs☆13Jun 20, 2025Updated 9 months ago
- SNN Cutoff Evaluation.☆17Aug 14, 2024Updated last year
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Oct 3, 2023Updated 2 years ago
- SOTA work about out-of-distribution detection☆14Mar 5, 2021Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆25Sep 5, 2025Updated 6 months ago
- A variant of Varibad that is robust to difficult tasks☆11Aug 30, 2023Updated 2 years ago
- Python 3 入门机器学习经典算法与应用☆10Mar 2, 2018Updated 8 years ago
- ☆45Nov 10, 2019Updated 6 years ago
- A library for experimenting with, training and evaluating neural networks, with a focus on adversarial robustness.☆944Jan 11, 2024Updated 2 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Imitation Adversarial Attacks for Black-box Neural Ranking Models☆12Feb 5, 2024Updated 2 years ago
- Official Repository for the ICLR 2022 paper "Generalization of Neural Combinatorial Solvers through the Lens of Adversarial Robustness"☆13Nov 20, 2022Updated 3 years ago