skloisMary / Adversarial-Neural-Cryptography
learning to protect communications with adversarial neural cryptography
☆20Updated 6 years ago
Alternatives and similar repositories for Adversarial-Neural-Cryptography:
Users that are interested in Adversarial-Neural-Cryptography are comparing it to the libraries listed below
- A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks☆16Updated 3 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆125Updated 4 years ago
- Source code and models of ACM MobiHoc 2019 paper "Scaling Deep Learning Models for Spectrum Anomaly Detection"☆12Updated 5 years ago
- A research oriented repository on the Security and Robustness of Deep Learning for Wireless Communication Systems☆87Updated 5 years ago
- Improved Techniques for Training GANs for cifar10 dataset☆18Updated last year
- Channel Reconstruction Network implemented in PyTorch☆74Updated 2 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆43Updated 5 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆28Updated last year
- Tensorflow implementation of Our APE-GAN☆23Updated 6 years ago
- A federated learning demo for AlexNet on CIFAR-10 dataset, basing on Tensorflow.☆61Updated 3 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 5 years ago
- tf implementation of federated learning☆42Updated 5 years ago
- The implementation of "Two-Stream Federated Learning: Reduce the Communication Costs" (VCIP 2018)☆14Updated 5 years ago
- Adversarial attacks including DeepFool and C&W☆13Updated 5 years ago
- ☆10Updated 2 years ago
- a CNN based end to end communication systems☆38Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆90Updated 5 years ago
- The implementation of "Towards Faster and Better Federated Learning: A Feature Fusion Approach" (ICIP 2019)☆36Updated 5 years ago
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 5 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 6 years ago
- vector quantization for stochastic gradient descent.☆33Updated 4 years ago
- Federated learning with PyTorch (federated averaging and consensus optimization): with 'reduced' bandwidth☆41Updated 9 months ago
- Code for the paper "Meta-Learning to Communicate: Fast End-to-End Training for Fading Channels"☆36Updated 5 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆112Updated 2 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 4 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆41Updated last year
- Code for paper "Byzantine-Resilient Distributed Finite-Sum Optimization over Networks"☆18Updated 4 years ago
- Code for Adv-watermark: A novel watermark perturbation for adversarial examples (ACM MM2020)☆41Updated 4 years ago
- Federated Learning for Internet of Things: A Federated Learning Framework for On-device Anomaly Data Detection, backed by FedML, Inc.☆44Updated 2 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 3 years ago