wang-yutao / Attack_Fashion_MNIST
图像分类模型的对抗攻击和对抗训练(使用Fashion MNIST数据集)
☆8Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Attack_Fashion_MNIST
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆40Updated last year
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆54Updated 5 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"☆49Updated this week
- Paper list of Adversarial Examples☆43Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆25Updated last year
- ☆11Updated last year
- 面向目标检测的对抗样本攻击☆20Updated 3 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆75Updated last year
- ☆48Updated 2 years ago
- ☆76Updated 3 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 2 years ago
- ☆12Updated 9 months ago
- Paper sharing in adversary related works☆44Updated 3 weeks ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆15Updated 2 years ago
- Decision-based Adversarial Attack with Frequency Mixup☆21Updated last year
- ☆21Updated last year
- PyTorch implementation of Expectation over Transformation☆12Updated 2 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆9Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆33Updated last year
- Reproduction of cw attack on pytorch with corresponding MNIST model☆22Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆76Updated 2 years ago
- Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks☆17Updated 5 years ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆22Updated last year
- 复现了下Neural Cleanse这篇论文,真的是简单而有效,发在了okaland☆30Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆24Updated 3 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆16Updated 8 months ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆90Updated 2 years ago
- ☆32Updated 8 months ago
- ☆79Updated 5 years ago