Pytorch Adversarial Attack Framework
☆78Apr 27, 2019Updated 7 years ago
Alternatives and similar repositories for mister_ed
Users that are interested in mister_ed are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- to add☆20Nov 21, 2019Updated 6 years ago
- SEAT☆21Oct 10, 2023Updated 2 years ago
- ☆31Feb 1, 2019Updated 7 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Toolbox for Adversarial Robustness Research☆1,367Sep 14, 2023Updated 2 years ago
- ☆20Mar 14, 2022Updated 4 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 3 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- A challenge to explore adversarial robustness of neural networks on CIFAR10.☆509Aug 30, 2021Updated 4 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 3 years ago
- Code for our NeurIPS 2019 *spotlight* "Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers"☆227Nov 9, 2019Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Nov 8, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Dec 4, 2022Updated 3 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 7 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆14Mar 22, 2025Updated last year
- ☆30Jul 6, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- code for model-targeted poisoning☆12Oct 3, 2023Updated 2 years ago
- ImageNet classifier with state-of-the-art adversarial robustness☆683Dec 31, 2019Updated 6 years ago
- IPython notebook with synthetic experiments for AFLite, based on the ICML 2020 paper, "Adversarial Filters of Dataset Biases".☆16Aug 14, 2020Updated 5 years ago
- Stanford CS244B Distributed Systems Final Project - Secure Peer-to-Peer File Locker☆12Jan 29, 2015Updated 11 years ago
- ☆21Jul 25, 2024Updated last year
- Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset☆19Apr 29, 2025Updated last year
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆261Apr 16, 2021Updated 5 years ago
- ☆14Jul 3, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- BrainProp: How the brain can implement reward-based error backpropagation☆17Dec 8, 2022Updated 3 years ago
- PyTorch-1.0 implementation for the adversarial training on MNIST/CIFAR-10 and visualization on robustness classifier.☆254Aug 26, 2020Updated 5 years ago
- My implementation of y-DCGAN,which can automatically learn embedding change probability for digital images.☆10Mar 25, 2018Updated 8 years ago
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆32Apr 28, 2022Updated 4 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Jul 15, 2020Updated 5 years ago
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆13Jul 1, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago