Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM
☆11Feb 17, 2018Updated 8 years ago
Alternatives and similar repositories for targeted-adversarial-mnist
Users that are interested in targeted-adversarial-mnist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- An AI stock agent help you sumerize market news and analysis data in real-time☆14Jul 23, 2025Updated 8 months ago
- ☆16Dec 18, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- An algorithm based on Java implementation, can automatically check the set of outliers in a set of data, eliminate these outliers, and fi…☆12May 11, 2021Updated 4 years ago
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- Simple pytorch classification baselines for MNIST, CIFAR and ImageNet☆19Aug 7, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Apr 5, 2021Updated 4 years ago
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆17Oct 29, 2019Updated 6 years ago
- 使用投毒posion的方式backdoor攻击LeNet-5网络,使用MNIST手写数据集☆14Feb 5, 2021Updated 5 years ago
- LeNet, AleNet, VGGNet, GoogleNet, ResNet are used for MNIST dataset based on keras.☆15Dec 11, 2018Updated 7 years ago
- Support input method in game on Windows platform☆15Jan 13, 2024Updated 2 years ago
- SNN Cutoff Evaluation.☆17Aug 14, 2024Updated last year
- the source code of ACM MM'21 paper "Discriminator-free Generative Adversarial Attack"☆11Dec 3, 2023Updated 2 years ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Aug 22, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An approach to a blind discrete Wavelet Transformation (DWT) domain feature point based image watermarking technique is proposed in this …☆19Dec 23, 2014Updated 11 years ago
- Generating Adversarial Examples for Holding Robustness of Source Code Processing Models☆15Dec 2, 2021Updated 4 years ago
- basic algorithms of Computer Science☆11Apr 24, 2016Updated 9 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- ☆15Jul 23, 2020Updated 5 years ago
- Data collection, models, and fingerprinting code for "Watch This Space: Securing Satellite Communication through Resilient Transmitter Fi…☆26Sep 5, 2025Updated 6 months ago
- Python code for inserting a watermark in the host image using Discrete Wavelet Transform and Singular Value Decomposition☆20May 14, 2019Updated 6 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)☆22Dec 30, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆19Feb 3, 2023Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- The sec3 audit reports and publications☆11Feb 2, 2026Updated last month
- ☆28Jul 9, 2022Updated 3 years ago
- An implementation of a sound dereverberation algorithm by Gilbert Soulodre☆23Apr 26, 2018Updated 7 years ago
- Code for the Paper: [ECCV2022] Sound Localization by Self-Supervised Time-Delay Estimation☆26Mar 15, 2023Updated 3 years ago
- Public implementation of the paper "On the Importance of Difficulty Calibration in Membership Inference Attacks".☆16Dec 1, 2021Updated 4 years ago