tabacof / adv_vaeLinks
Adversarial Images for Variational Autoencoders
☆13Updated 8 years ago
Alternatives and similar repositories for adv_vae
Users that are interested in adv_vae are comparing it to the libraries listed below
Sorting:
- Code used in 'Exploring the Space of Black-box Attacks on Deep Neural Networks' (https://arxiv.org/abs/1712.09491)☆61Updated 7 years ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- Related materials for robust and explainable machine learning☆48Updated 7 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆85Updated 6 years ago
- Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation [NeurIPS 2017]☆18Updated 7 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆64Updated 6 years ago
- ☆29Updated 6 years ago
- Caffe code for the paper "Adversarial Manipulation of Deep Representations"☆17Updated 7 years ago
- ☆18Updated 5 years ago
- ☆48Updated 4 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆19Updated 8 years ago
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Updated 7 years ago
- Analysis of Adversarial Logit Pairing☆60Updated 6 years ago
- GANs with multiple Discriminators☆78Updated 2 years ago
- Tensorflow implementation of Our APE-GAN☆23Updated 7 years ago
- Data independent universal adversarial perturbations☆62Updated 5 years ago
- Code for "Robustness May Be at Odds with Accuracy"☆91Updated 2 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Updated 6 years ago
- Repository for our ICCV 2019 paper: Adversarial Defense via Learning to Generate Diverse Attacks☆22Updated 3 years ago
- Scaleable input gradient regularization☆22Updated 6 years ago
- Pytorch Adversarial Attack Framework☆78Updated 6 years ago
- Ensemble Adversarial Training on MNIST☆121Updated 8 years ago
- Investigating the robustness of state-of-the-art CNN architectures to simple spatial transformations.☆49Updated 5 years ago
- Provable Robustness of ReLU networks via Maximization of Linear Regions [AISTATS 2019]☆32Updated 5 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 5 years ago
- Public repo for transferability ICLR 2017 paper☆52Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆57Updated 6 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Updated 3 years ago
- Code for "Detecting Adversarial Attacks on Neural Network Policies with Visual Foresight"☆79Updated 7 years ago