对抗样本(Adversarial Examples)和投毒攻击(Poisoning Attacks)相关资料
☆117Jun 3, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-Machine-Learning
Users that are interested in Adversarial-Machine-Learning are comparing it to the libraries listed below
Sorting:
- 对抗样本☆275Dec 8, 2022Updated 3 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- Paper list of Adversarial Examples☆52Oct 12, 2023Updated 2 years ago
- Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and …☆1,410Feb 15, 2023Updated 3 years ago
- 面向目标检测的对抗样本攻击☆25Mar 17, 2021Updated 4 years ago
- Implementation of Wasserstein adversarial attacks.☆24Jan 2, 2021Updated 5 years ago
- Code for the IEEE S&P 2018 paper 'Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning'☆55Mar 24, 2021Updated 4 years ago
- A paper summary of Backdoor Attack against Neural Network☆13Aug 9, 2019Updated 6 years ago
- ☆14Jul 25, 2020Updated 5 years ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆43Oct 24, 2021Updated 4 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆51Feb 27, 2021Updated 5 years ago
- a residual network for image steganalysis☆18Sep 28, 2017Updated 8 years ago
- Adversarial Attacks on Node Embeddings via Graph Poisoning☆59Dec 23, 2019Updated 6 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ICCV 2021 papers and code focus on adversarial attacks and defense☆11Nov 5, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆88May 29, 2019Updated 6 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- A Toolbox for Adversarial Robustness Research☆1,367Sep 14, 2023Updated 2 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆11Sep 3, 2020Updated 5 years ago
- PyTorch library for adversarial attack and training☆145Jan 16, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/provable-data-possession☆14Oct 19, 2015Updated 10 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- ☆14Dec 31, 2024Updated last year
- 欺骗防御Linux版本Agent☆13Jul 26, 2021Updated 4 years ago
- ☆11Mar 5, 2021Updated 4 years ago
- An adversarial attack on object detectors☆148Oct 12, 2021Updated 4 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Aug 22, 2023Updated 2 years ago
- Robust evasion attacks against neural network to find adversarial examples☆859Jun 1, 2021Updated 4 years ago