wang-yutao / Attack_Fashion_MNIST
图像分类模型的对抗攻击和对抗训练(使用Fashion MNIST数据集)
☆8Updated 4 years ago
Alternatives and similar repositories for Attack_Fashion_MNIST:
Users that are interested in Attack_Fashion_MNIST are comparing it to the libraries listed below
- Paper list of Adversarial Examples☆46Updated last year
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆56Updated 5 months ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆42Updated 2 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Updated 5 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 5 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- This is the documentation of the Tensorflow/Keras implementation of Latent Backdoor Attacks. Please see the paper for details Latent Back…☆19Updated 3 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆18Updated 2 years ago
- ☆31Updated 3 years ago
- TIFS2022: Decision-based Adversarial Attack with Frequency Mixup☆22Updated last year
- 面向目标检测的对抗样本攻击☆21Updated 4 years ago
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Updated 4 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆18Updated last year
- 使用pytorch实现FGSM☆29Updated 3 years ago
- Distribution Preserving Backdoor Attack in Self-supervised Learning☆15Updated last year
- [IEEE S&P 2024] Exploring the Orthogonality and Linearity of Backdoor Attacks☆21Updated 2 weeks ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆27Updated last year
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆71Updated 2 years ago
- A list of recent adversarial attack and defense papers (including those on large language models)☆37Updated this week
- ☆22Updated 2 years ago
- ☆81Updated 3 years ago
- A minimal PyTorch implementation of Label-Consistent Backdoor Attacks☆30Updated 4 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆11Updated last year
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- ☆15Updated last year
- ☆18Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Paper sharing in adversary related works☆45Updated 2 months ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated 2 years ago