Generating Natural Adversarial Examples, ICLR 2018
☆142May 17, 2018Updated 7 years ago
Alternatives and similar repositories for natural-adversary
Users that are interested in natural-adversary are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Apr 15, 2019Updated 6 years ago
- Code for the paper "Adversarially Regularized Autoencoders (ICML 2018)" by Zhao, Kim, Zhang, Rush and LeCun☆398Apr 11, 2020Updated 5 years ago
- Ensemble Adversarial Training on MNIST☆122Jun 20, 2017Updated 8 years ago
- Pytorch code to generate adversarial examples on mnist and ImageNet data.☆118Dec 31, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code for "Semantically Equivalent Adversarial Rules for Debugging NLP Models"☆87Oct 16, 2018Updated 7 years ago
- A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition☆255Oct 30, 2019Updated 6 years ago
- Implementation of Papers on Adversarial Examples☆397Apr 24, 2023Updated 2 years ago
- syntactically controlled paraphrase networks☆168Dec 30, 2018Updated 7 years ago
- [EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Q…☆25Oct 19, 2021Updated 4 years ago
- ☆48Feb 9, 2021Updated 5 years ago
- A challenge to explore adversarial robustness of neural networks on MNIST.☆761May 3, 2022Updated 3 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Robust evasion attacks against neural network to find adversarial examples☆859Jun 1, 2021Updated 4 years ago
- ☆19Feb 6, 2019Updated 7 years ago
- Analysis of Adversarial Logit Pairing☆60Aug 13, 2018Updated 7 years ago
- Contest Proposal and infrastructure for the Unrestricted Adversarial Examples Challenge☆334Sep 17, 2020Updated 5 years ago
- ImageNet classifier with state-of-the-art adversarial robustness☆685Dec 31, 2019Updated 6 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 8 years ago
- Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples☆908Jun 10, 2023Updated 2 years ago
- Generative Adversarial Perturbations (CVPR 2018)☆138Dec 16, 2020Updated 5 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆551Mar 30, 2023Updated 3 years ago
- AAAI 2019 oral presentation☆53May 30, 2025Updated 10 months ago
- A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX☆2,952Dec 3, 2025Updated 4 months ago
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 6 years ago
- Code for FAB-attack☆33Jul 10, 2020Updated 5 years ago
- ☆16Dec 17, 2018Updated 7 years ago
- Code for the paper 'Understanding Measures of Uncertainty for Adversarial Example Detection'☆62Jun 3, 2018Updated 7 years ago
- Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)☆146Oct 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- Implementation code for the paper "Generating Natural Language Adversarial Examples"☆171Aug 30, 2019Updated 6 years ago
- Fine Grained Visual Categorization☆11Jun 16, 2018Updated 7 years ago
- Tensorflow implementation of Generating Adversarial Examples with Adversarial Networks☆44Feb 7, 2019Updated 7 years ago
- HPYLMのC++実装☆11May 2, 2017Updated 8 years ago
- 👿→😈☆25Dec 19, 2017Updated 8 years ago
- CodeBase for Paper: "Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers", / Interactive Demo @☆82May 1, 2023Updated 2 years ago