对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料
☆119Jun 3, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-Machine-Learning
Users that are interested in Adversarial-Machine-Learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 对抗样本☆274Dec 8, 2022Updated 3 years ago
- 面向目标检测的对抗样本攻击☆24Mar 17, 2021Updated 5 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Paper list of Adversarial Examples☆51Oct 12, 2023Updated 2 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Oct 24, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,408Feb 15, 2023Updated 3 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- An implementation of the 'fast gradient sign method' from the paper 'Explaining and Harnessing Adversarial Examples'☆55May 26, 2017Updated 8 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Dec 23, 2019Updated 6 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Feb 27, 2021Updated 5 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Paper Collection of Adversarial Machine Learning☆31Jul 28, 2019Updated 6 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- 华中科技大学计算机视觉实验,基于卷积神经网络的手写数字识别,和快速梯度下降法(FGSM)的攻击以及基于对抗训练的防御。☆14Feb 20, 2023Updated 3 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- This is the repository for the AI2019, tutorial on adversarial machine learning☆16Jul 20, 2020Updated 5 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆211May 27, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆16Dec 12, 2022Updated 3 years ago
- ☆11Mar 5, 2021Updated 5 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and…☆5,925Dec 12, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Dec 3, 2021Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Oct 21, 2020Updated 5 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Sep 16, 2025Updated 6 months ago
- reference implementation for "explanations can be manipulated and geometry is to blame"☆37Jul 24, 2022Updated 3 years ago
- A Toolbox for Adversarial Robustness Research☆1,361Sep 14, 2023Updated 2 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- A curated list of awesome Unlearnable Example papers resources.☆13Dec 14, 2025Updated 4 months ago