tabacof / adv_vaeLinks
Adversarial Images for Variational Autoencoders
☆13Updated 9 years ago
Alternatives and similar repositories for adv_vae
Users that are interested in adv_vae are comparing it to the libraries listed below
Sorting:
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- ☆18Updated 6 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 7 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Updated 8 years ago
- GANs with multiple Discriminators☆78Updated 3 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Updated 6 years ago
- ☆48Updated 4 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 3 years ago
- Caffe code for the paper "Adversarial Manipulation of Deep Representations"☆17Updated 8 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 7 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Updated 8 years ago
- Data independent universal adversarial perturbations☆63Updated 5 years ago
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Updated 7 years ago
- Related materials for robust and explainable machine learning☆48Updated 7 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Updated 3 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Updated 8 years ago
- Deflecting Adversarial Attacks with Pixel Deflection☆71Updated 7 years ago
- Code for "Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight"☆79Updated 8 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Updated 5 years ago
- Scaleable input gradient regularization☆22Updated 6 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Updated 7 years ago
- Public repo for transferability ICLR 2017 paper☆51Updated 6 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 6 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 6 years ago
- Generalized Data-free Universal Adversarial Perturbations☆73Updated 7 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 6 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆31Updated 5 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆91Updated 2 years ago
- ☆30Updated 6 years ago