skloisMary / Adversarial-Neural-CryptographyLinks
learning to protect communications with adversarial neural cryptography
☆20Updated 6 years ago
Alternatives and similar repositories for Adversarial-Neural-Cryptography
Users that are interested in Adversarial-Neural-Cryptography are comparing it to the libraries listed below
Sorting:
- A research oriented repository on the Security and Robustness of Deep Learning for Wireless Communication Systems☆89Updated 5 years ago
- The FGSM, DeepFool and CW Adversarial Attacks with TensorFlow 2.0☆29Updated last year
- Source code and models of ACM MobiHoc 2019 paper "Scaling Deep Learning Models for Spectrum Anomaly Detection"☆12Updated 5 years ago
- A Robust Adversarial Network-Based End-to-End Communications System With Strong Generalization Ability Against Adversarial Attacks☆16Updated 3 years ago
- Improved Techniques for Training GANs for cifar10 dataset☆20Updated 2 years ago
- A federated learning demo for AlexNet on CIFAR-10 dataset, basing on Tensorflow.☆61Updated 4 years ago
- A tensorflow implementation and improvement of CVPR 2019 paper 'ComDefend'.☆15Updated 5 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆43Updated 6 years ago
- The implementation of "Two-Stream Federated Learning: Reduce the Communication Costs" (VCIP 2018)☆15Updated 5 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Updated 4 years ago
- The implementation of "Towards Faster and Better Federated Learning: A Feature Fusion Approach" (ICIP 2019)☆36Updated 5 years ago
- The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.☆62Updated 2 years ago
- vector quantization for stochastic gradient descent.☆35Updated 5 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆129Updated 4 years ago
- tf implementation of federated learning☆42Updated 6 years ago
- Privacy Risks of Securing Machine Learning Models against Adversarial Examples☆44Updated 5 years ago
- Federated Learning for Internet of Things: A Federated Learning Framework for On-device Anomaly Data Detection, backed by FedML, Inc.☆44Updated 2 years ago
- [ECCV 2018] Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study☆39Updated 2 years ago
- ☆27Updated 7 years ago
- An implementation of "Convolutional Radio Modulation Recognition Networks"☆47Updated 7 years ago
- Implementation of adversarial training under fast-gradient sign method (FGSM), projected gradient descent (PGD) and CW using Wide-ResNet-…☆40Updated 5 years ago
- Code for paper "Byzantine-Resilient Distributed Finite-Sum Optimization over Networks"☆18Updated 4 years ago
- signal denoising + modulation recognition☆10Updated 6 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- 百度AI 安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Updated 4 years ago
- A pytorch implementation of "Explaining and harnessing adversarial examples"☆67Updated 5 years ago
- ☆18Updated 2 years ago
- Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"☆31Updated 3 years ago
- Neural Joint-Source Channel Coding☆51Updated 6 years ago
- Implementation of Compressed SGD with Compressed Gradients in Pytorch☆13Updated 10 months ago