skloisMary / Adversarial-Neural-Cryptography
learning to protect communications with adversarial neural cryptography
☆20Updated 6 years ago
Alternatives and similar repositories for Adversarial-Neural-Cryptography
Users that are interested in Adversarial-Neural-Cryptography are comparing it to the libraries listed below
Sorting:
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 6 years ago
- This is PyTorch Implementation of Universal Adversarial Perturbation (https://arxiv.org/abs/1610.08401)☆43Updated 6 years ago
- Tensorflow implementation of Our APE-GAN☆23Updated 7 years ago
- A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks☆16Updated 3 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆29Updated last year
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆96Updated 4 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Updated 5 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 6 years ago
- The implementation of "Two-Stream Federated Learning: Reduce the Communication Costs" (VCIP 2018)☆15Updated 5 years ago
- The implementation of "Towards Faster and Better Federated Learning: A Feature Fusion Approach" (ICIP 2019)☆36Updated 5 years ago
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆11Updated 5 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- The code for ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples (CVPR2019)☆113Updated 2 years ago
- Train several classical classification networks in cifar10 dataset by PyTorch☆24Updated 4 years ago
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Updated 5 years ago
- An efficient adversarial defense method with strong insights which won the fifth place of the IJCAI-2019 Alibaba Adversarial AI Challen…☆11Updated 5 years ago
- Improving the Generalization of Adversarial Training with Domain Adaptation☆33Updated 6 years ago
- Source code and models of ACM MobiHoc 2019 paper "Scaling Deep Learning Models for Spectrum Anomaly Detection"☆12Updated 5 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆31Updated 3 years ago
- Ensemble Adversarial Training on MNIST with pytorch☆20Updated 6 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Updated 4 years ago
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Updated 4 years ago
- 2-stage pruning to favor distributed inference (local device compute half of the model, upload the feature for further computing on stron…☆23Updated 6 years ago
- A novel data-free model stealing method based on GAN☆127Updated 2 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆127Updated 4 years ago
- code for TPDS paper "Towards Fair and Privacy-Preserving Federated Deep Models"☆31Updated 2 years ago
- ☆54Updated 2 years ago
- MagNet: a Two-Pronged Defense against Adversarial Examples☆98Updated 6 years ago