An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'
☆55May 26, 2017Updated 8 years ago
Alternatives and similar repositories for machine_learning_adversarial_examples
Users that are interested in machine_learning_adversarial_examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Final Project for COMP 551. A detailed tutorial on the various techniques employed for adversarial attacks on machine learning classifier…☆12May 16, 2017Updated 8 years ago
- Pytorch code to generate adversarial examples on mnist and ImageNet data.☆118Dec 31, 2018Updated 7 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130May 1, 2023Updated 3 years ago
- Adversarial examples on keras and tensorflow☆12Apr 5, 2017Updated 9 years ago
- Implementation of Papers on Adversarial Examples☆396Apr 24, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 8 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Benchmarking and Visualization Tool for Adversarial Machine Learning☆188Apr 4, 2023Updated 3 years ago
- ⚖️ Code for the paper "Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning".☆11Dec 8, 2022Updated 3 years ago
- Create adversarial images to fool a MNIST classifier in TensorFlow☆14Jun 8, 2017Updated 8 years ago
- Crafting adversarial images☆222Jan 3, 2019Updated 7 years ago
- Implemention of Fast Gradient Sign Method for generating adversarial examples in Keras☆43Apr 6, 2019Updated 7 years ago
- Source code to execute signal injection attacks against CCD image sensors☆11Aug 26, 2021Updated 4 years ago
- Generative Matching Networks☆29May 3, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆70Sep 4, 2019Updated 6 years ago
- Shows how to create basic image adversaries, and train adversarially robust image classifiers (to some extent).☆13Oct 14, 2020Updated 5 years ago
- 对抗样本☆276Dec 8, 2022Updated 3 years ago
- Show-and-Fool: Adversarial Examples for Image Captioning task☆56Jul 6, 2021Updated 4 years ago
- ☆15Oct 29, 2018Updated 7 years ago
- DTLC-GAN Tensorflow☆12Aug 29, 2018Updated 7 years ago
- A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturb…☆12Aug 5, 2020Updated 5 years ago
- This is the repository for the AI2019, tutorial on adversarial machine learning☆16Jul 20, 2020Updated 5 years ago
- [Machine Learning 2023] Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness☆16Jul 5, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆23Dec 27, 2020Updated 5 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Repo of simple adversarial examples on vanilla neural networks trained on MNIST☆121May 8, 2020Updated 5 years ago
- A curated list of awesome adversarial machine learning resources☆1,904Nov 26, 2020Updated 5 years ago
- Bachelor's Thesis on Adversarial Machine Learning Attacks and Defences☆17Nov 18, 2022Updated 3 years ago
- ☆14Apr 12, 2019Updated 7 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆238Mar 27, 2018Updated 8 years ago
- This is my code from competition Google Cloud & YouTube-8M Video Understanding Challenge. My solution based on video level features only.☆16Jun 5, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40May 15, 2020Updated 5 years ago
- Repository for image caption for Chinese☆28Dec 3, 2017Updated 8 years ago
- MultipleStyleCheckBoxKit have multiple style check box, due with multiple line text, network photo, local photo, useful on news vote. …☆17Mar 16, 2016Updated 10 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆28Feb 8, 2021Updated 5 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Paper Collection of Adversarial Machine Learning☆31Jul 28, 2019Updated 6 years ago
- Unsupervised Model-based Dense Face Alignment☆10Aug 27, 2020Updated 5 years ago