toshi-k / kaggle-nips-2017-adversarial-attackView external linksLinks
5th place solution in "NIPS 2017: Non-targeted Adversarial Attack" (with solution in targeted attack and defence)
☆10Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for kaggle-nips-2017-adversarial-attack
Users that are interested in kaggle-nips-2017-adversarial-attack are comparing it to the libraries listed below
Sorting:
- Code to reproduce the attacks and defenses for the entries "JeromeR" in the NIPS 2018 Adversarial Vision Challenge☆19May 1, 2019Updated 6 years ago
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆147Oct 24, 2018Updated 7 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- [CVPR'19] Trust Region Based Adversarial Attack☆20Dec 11, 2020Updated 5 years ago
- Adversarial Attacks and Defenses of Image Classifiers, NIPS 2017 competition track☆45Oct 7, 2017Updated 8 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- ☆20Jun 10, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- 中国传媒大学网络安全本科专业课程课件☆29Feb 22, 2025Updated 11 months ago
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 5 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- NIPS Adversarial Vision Challenge☆41Sep 17, 2018Updated 7 years ago
- Identification of the Adversary from a Single Adversarial Example (ICML 2023)☆10Jul 15, 2024Updated last year
- AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach☆12Mar 31, 2021Updated 4 years ago
- ☆10May 18, 2024Updated last year
- CIDR to IP List Tool☆14Mar 12, 2016Updated 9 years ago
- Pytorch Implementation of ENet: A Deep Neural Network Architecture for Real-Time Semantic Segmentation (https://arxiv.org/abs/1606.02147)☆11Jan 24, 2020Updated 6 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Code of On L-p Robustness of Decision Stumps and Trees, ICML 2020☆10Aug 3, 2020Updated 5 years ago
- ☆15Dec 1, 2023Updated 2 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆39Sep 22, 2018Updated 7 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- El0ps: An Exact L0-Problem Solver☆13Jan 6, 2026Updated last month
- Google foobar challenge!☆10Sep 10, 2017Updated 8 years ago
- CAAD 2018 winning submissions☆35Feb 10, 2019Updated 7 years ago
- Seminar: intro to deep learning with tensorflow☆13Jun 27, 2017Updated 8 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆252Oct 30, 2019Updated 6 years ago
- Recurrent Models of Visual Attention (RAM) with Chainer☆44Apr 18, 2017Updated 8 years ago
- ☆248Jan 12, 2019Updated 7 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- Implements attacks and defenses for machine learning systems☆13May 7, 2017Updated 8 years ago
- Poincaré Embeddings for Learning Hierarchical Representations (https://arxiv.org/abs/1705.08039) in PyTorch☆15Dec 20, 2017Updated 8 years ago
- ☆10Apr 22, 2016Updated 9 years ago
- TensorFlow: learn and practice☆11Aug 30, 2018Updated 7 years ago
- A Go package that partially reimplements darts-clone☆12Apr 1, 2018Updated 7 years ago
- Official implementation of NeurIPS'24 Spotlight paper "Monte Carlo Tree Search based Space Transfer for Black-box Optimization".☆12Nov 28, 2024Updated last year
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago