Creating and defending against adversarial examples
☆41Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for adversarial
Users that are interested in adversarial are comparing it to the libraries listed below
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Visualization of Adversarial Examples☆34Oct 14, 2018Updated 7 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- Interval attacks (adversarial ML)☆21Jun 17, 2019Updated 6 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Feb 18, 2021Updated 5 years ago
- Adversarial Ranking Attack and Defense, ECCV, 2020.☆24Sep 16, 2021Updated 4 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆91Mar 24, 2023Updated 2 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆757May 3, 2022Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- ☆19Jul 1, 2023Updated 2 years ago
- Overcoming Catastrophic Forgetting by Incremental Moment Matching (IMM)☆35Dec 27, 2017Updated 8 years ago
- Neural Destruction Search for Vehicle Routing Problems☆18Oct 6, 2025Updated 4 months ago
- code for paper "DRoC: Elevating Large Language Models for Complex Vehicle Routing via Decomposed Retrieval of Constraints"☆25Feb 4, 2025Updated last year
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- ☆14Nov 27, 2025Updated 3 months ago
- Code for "Zero-Shot Out-of-Distribution Detection with Feature Correlations"☆13Jan 19, 2020Updated 6 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- Code for FAB-attack☆34Jul 10, 2020Updated 5 years ago
- A Closer Look at Accuracy vs. Robustness☆88May 17, 2021Updated 4 years ago
- Python 3 入门机器学习经典算法与应用☆10Mar 2, 2018Updated 8 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Implementation of YOLO (You Only Look Once) computer Vision algorithm in a React UI, for the subject Intelligent Systems (ULL)☆10Jan 27, 2019Updated 7 years ago
- ☆14Jul 19, 2020Updated 5 years ago
- a Firefox extension for reddit social news sites.☆17Apr 7, 2011Updated 14 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- [AAAI 2026] TrajEvo: Designing Trajectory Prediction Heuristics via LLM-driven Evolution☆14Aug 1, 2025Updated 7 months ago
- Model-based Hindsight Experience Replay☆10Jun 8, 2022Updated 3 years ago
- ☆11May 20, 2022Updated 3 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- Convolutional Sparse Coding☆10Jul 18, 2014Updated 11 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- Berkeley's Data8 Infrastructure specific documentation & guides☆10Jun 22, 2020Updated 5 years ago
- ☆11Mar 24, 2023Updated 2 years ago
- reddit's python experiments framework☆12Apr 28, 2025Updated 10 months ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 3 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- SparklingGraph documentation☆10Jan 7, 2020Updated 6 years ago
- Used TensorFlow to build a neural network that can predict fraudulent credit card transactions.☆10Jun 21, 2017Updated 8 years ago