☆79Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for Adversarial-Attack-Algorithms
Users that are interested in Adversarial-Attack-Algorithms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For Competition on Adversarial Attacks and Defenses 2018☆39Jan 4, 2019Updated 7 years ago
- This repository is for NeurIPS 2018 spotlight paper "Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples."☆32Apr 27, 2022Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆136May 29, 2018Updated 7 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A PyTorch baseline attack example for the NIPS 2017 adversarial competition☆86Aug 10, 2017Updated 8 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- A curated list of awesome resources for adversarial examples in deep learning☆265Feb 4, 2021Updated 5 years ago
- Implementation of Papers on Adversarial Examples☆396Apr 24, 2023Updated 3 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Code for Geometry-Aware Generation of Adversarial Point Clouds☆35Jul 15, 2021Updated 4 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Feb 25, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆16Apr 24, 2022Updated 4 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆763May 3, 2022Updated 4 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆12Dec 13, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆18May 21, 2018Updated 7 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Black-Box Adversarial Attack on Public Face Recognition Systems☆416Jul 6, 2021Updated 4 years ago
- VizSec17: Web-based visualization tool for adversarial machine learning / LiveDemo☆130May 1, 2023Updated 3 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Nov 11, 2019Updated 6 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- ☆63Apr 2, 2021Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 7 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Feb 1, 2023Updated 3 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- Repo of simple adversarial examples on vanilla neural networks trained on MNIST☆121May 8, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆146Oct 24, 2018Updated 7 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆907Jun 10, 2023Updated 2 years ago
- LaTeX source for the paper "On Evaluating Adversarial Robustness"☆261Apr 16, 2021Updated 5 years ago
- ☆14Apr 18, 2022Updated 4 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- Official TensorFlow implementation of "Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization" (ICML 2019)☆42Dec 7, 2020Updated 5 years ago