rookiedata1 / Keras-CNN-mnist-classificationLinks
LeNet, AleNet, VGGNet, GoogleNet, ResNet are used for MNIST dataset based on keras.
☆15Updated 6 years ago
Alternatives and similar repositories for Keras-CNN-mnist-classification
Users that are interested in Keras-CNN-mnist-classification are comparing it to the libraries listed below
Sorting:
- Implemention of Fast Gradient Sign Method for generating adversarial examples in Keras☆43Updated 6 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Updated 4 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆68Updated 6 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 5 years ago
- ☆79Updated 6 years ago
- Adversarial Examples: Attacks and Defenses for Deep Learning☆32Updated 7 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Updated 2 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 6 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆32Updated 5 years ago
- NIPS 2017 - Adversarial Learning☆35Updated 7 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆136Updated 4 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆40Updated 7 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆74Updated 7 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆23Updated 6 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆15Updated 5 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Updated 2 years ago
- Public repo for transferability ICLR 2017 paper☆52Updated 6 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆57Updated 6 years ago
- Train&prediction of Cifar10 dataset using Resnet50 - Python-Keras☆28Updated 3 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆133Updated 7 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- ☆11Updated 5 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Updated 7 years ago
- Physical adversarial attack for fooling the Faster R-CNN object detector☆166Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Updated 4 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆251Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆89Updated 6 years ago
- Mitigating Adversarial Effects Through Randomization☆120Updated 7 years ago
- Robustness vs Accuracy Survey on ImageNet☆98Updated 4 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago