Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for adversarial attacks
adversarial-attacks
x
290 search results found
Lpf Defense
⭐
10
Code and Data for the paper "LPF-Defense: 3D Adversarial Defense based on Frequency Analysis", PLoS ONE
Sa_dqn
⭐
10
[NeurIPS 2020, Spotlight] State-Adversarial DQN (SA-DQN) for robust deep reinforcement learning
Project Athena
⭐
10
This is the course project for CSCE585: ML Systems. Students will build their machine learning systems based on the provided infrastructure --- Athena.
Decepticonlp
⭐
10
Python Library for Robustness Monitoring and Adversarial Debugging of NLP models
Under_convnet
⭐
10
Caffe code for the paper "Adversarial Manipulation of Deep Representations"
Verinet
⭐
10
The VeriNet toolkit for verification of neural networks
Manifoldmixup
⭐
10
ManifoldMixup with support for Interpolated Adversarial training
Smoothfool
⭐
10
SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations
Nips 2018 Adversarial Vision Challenge
⭐
10
Code, documents, and deployment configuration files, related to our participation in the 2018 NIPS Adversarial Vision Challenge "Robust Model Track"
Assuda
⭐
10
Exploring Robustness of Unsupervised Domain Adaptation in Semantic Segmentation (ICCV 2021; Oral)
Grnn
⭐
10
Official implementation of "GRNN: Generative Regression Neural Network - A Data Leakage Attack for Federated Learning"
Wormholes
⭐
10
Official implementation & data for paper "Strong and Precise Modulation of Human Percepts via Robustified ANNs" (NeurIPS 2023)
Uae Rs
⭐
10
Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark
Saga
⭐
10
SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)
Snn Adversarial Attacks
⭐
9
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Spa
⭐
9
Official code repository of paper titled "SPA: Spectrum Perturbation Attack for Volumetric Medical Image Segmentation".
Targeted Adversarial Perturbations Monocular Depth
⭐
9
PyTorch implementation of Targeted Adversarial Perturbations for Monocular Depth Predictions (in NeurIPS 2020)
Sada
⭐
9
SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications (AAAI 2020)
Sgd Uap Torch
⭐
9
Universal Adversarial Perturbations (UAPs) for PyTorch
Ml Talk
⭐
9
📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools
Stereoscopic Universal Perturbations
⭐
9
PyTorch Implementation of Stereoscopic Universal Perturbations across Different Architectures and Datasets (CVPR 2022)
Heterobust
⭐
9
How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications (KDD'22)
Reap Benchmark
⭐
9
REAP: A Large-Scale Realistic Adversarial Patch Benchmark
Zeroe
⭐
9
From Hero to Zéroe: A Benchmark of Low-Level Adversarial Attacks
Gairat Lsa
⭐
9
Evaluating GAIRAT robustness using Logit Scaling Attack.
White 2 Black
⭐
9
The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks
Md_attacks
⭐
9
Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness. (MD attacks)
Tsfool
⭐
9
Repository of the TSFool method proposed in paper "TSFool: Crafting Highly-Imperceptible Adversarial Time Series through Multi-Objective Attack".
It Defense
⭐
8
Our code for paper 'The art of defense: letting networks fool the attacker', IEEE Transactions on Information Forensics and Security, 2023
C2matrix Analyzer
⭐
8
Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack
Metaadvdet
⭐
8
The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"
Featurespaceattack
⭐
8
Code for AAAI 2021 "Towards Feature Space Adversarial Attack".
Mair
⭐
8
PyTorch implementation of adversarial defenses [Fantastic Robustness Measures: The Secrets of Robust Generalization, NeurIPS 2023].
Linear Region Attack
⭐
8
A powerful white-box adversarial attack that exploits knowledge about the geometry of neural networks to find minimal adversarial perturbations without doing gradient descent
Whoneedsadversaries
⭐
8
Code implementing the experiments described in the NeurIPS 2018 paper "With Friends Like These, Who Needs Adversaries?".
Foolyourvllms
⭐
8
Code for paper: Fool Your (Vision and) Language Model With Embarrassingly Simple Permutations
Vanilla Adversarial Training
⭐
8
vanilla training and adversarial training in PyTorch
Adversarial Driving
⭐
8
Adversarial Driving v.s. Autonomous Driving.
Deep Chicken Saviour
⭐
8
using adversarial attacks to confuse deep-chicken-terminator 🛡️ 🐔
Meta Adversarial Training
⭐
8
Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.
Odi
⭐
8
[CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method
Pytorch Gnn Meta Attack
⭐
8
Pytorch implementation of gnn meta attack (mettack). Paper title: Adversarial Attacks on Graph Neural Networks via Meta Learning.
Eegadversary
⭐
8
This is a toolbox to construct adversarial examples of EEG signals. The traditional EEG extraction methods and classifiers are re-implemented in Tensorflow.
Sacnet
⭐
7
Self-Attention Context Network: Addressing the Threat of Adversarial Attacks for Hyperspectral Image Classification
Adversarial.jl
⭐
7
Adversarial attacks for Neural Networks written with FluxML
Tth
⭐
7
Source code of our ICASSP2023 paper: Towards Making a Trojan-horse Attack on Text-to-Image Retrieval.
Transferattacksurrogates
⭐
7
The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability". We study how to train surrogates model for boosting transfer attack.
Defending Against Backdoors With Robust Learning Rate
⭐
7
The code of AAAI-21 paper titled "Defending against Backdoors in Federated Learning with Robust Learning Rate".
Adversarial Attack On 3d U Net Model Brain Tumour Segmentation.
⭐
7
Adversarial Attack on 3D U-Net model: Brain Tumour Segmentation.
Adversarial_attack_on_rnn
⭐
7
Performing C&W attack on Recurrent Neural Network
Adversarial
⭐
7
A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system
Attack_vae
⭐
7
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks
Stereopagnosia
⭐
7
PyTorch implementation of Stereopagnosia: Fooling Stereo Networks with Adversarial Perturbations (in AAAI 2021)
Robustadversarialnetwork
⭐
7
A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"
Ipnn Pytorch
⭐
7
A pytorch implementation of "Intriguing properties of neural networks"
Facpa
⭐
7
Fast Adversarial CNN-based Perturbation Attack on no-reference image- and video-quality metrics
Packet_captor_sakura
⭐
7
Research code for "Improving Meek With Adversarial Techniques"
Fda
⭐
7
Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq
Cw Pytorch
⭐
6
A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"
Non Adversarial_backdoor
⭐
6
Implementation of "Beating Backdoor Attack at Its Own Game" (ICCV-23).
Inn
⭐
6
Detecting Failure Modes in Image Reconstructions with Interval Neural Network Uncertainty
Adversarial Machine Learning
⭐
6
Taller de Adversarial Machine Learning
Awesome Real World Adversarial Examples
⭐
6
😎 A curated list of awesome real-world adversarial examples resources
Asradversarialattacks
⭐
6
An ASR (Automatic Speech Recognition) adversarial attack repository.
Gradient Adversarial Transformation Network
⭐
6
enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)
Morphence
⭐
6
Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models trained on MNIST and CIFAR10.
Gfcs
⭐
6
Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"
Capsule_network_tensorflow
⭐
6
Capsule Network implementation in Tensorflow
Adversarialconvex
⭐
6
Tensorflow implementation for generating adversarial examples using convex programming
Semanticshield
⭐
6
The Security Toolkit for managing Generative AI(especially LLMs) and Supervised Learning processes(Learning and Inference).
Dnnf
⭐
6
Deep Neural Network Falsification
Maya
⭐
6
Code base for the EMNLP 2021 paper, "Multi-granularity Textual Adversarial Attack with Behavior Cloning".
Adversarial Machine Learning
⭐
6
Hands-on tutorial on adversarial examples 😈. With Streamlit app ❤️.
Learning To Break Deep Perceptual Hashing
⭐
6
Source code for our ACM FAccT 2022 paper "Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash"
Sa_ppo
⭐
6
[NeurIPS 2020 Spotlight] State-adversarial PPO for robust deep reinforcement learning
Solution For Aisafety Cvpr2022
⭐
5
A Simple and Effective Solution For AISafety CVPR2022, ranked 5th
Cvpr22w_robustnessthroughthelens
⭐
5
Official repository of our submission "Adversarial Robustness through the Lens of Convolutional Filters" for the CVPR2022 Workshop "The Art of Robustness: Devil and Angel in Adversarial Machine Learning Workshop"
Vbad
⭐
5
Black-box Adversarial Attacks on Video Recognition Models. (VBAD)
Advsv.github.io
⭐
5
AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. It aims to benchmark the robustness of ASV models in the face of such attacks and offers vital resources for researchers to explore the characteristics of adversarial and replay attacks in this domain.
Composite Adv
⭐
5
[CVPR23] "Towards Compositional Adversarial Robustness: Generalizing Adversarial Training to Composite Semantic Perturbations" by Lei Hsiung, Yun-Yun Tsai, Pin-Yu Chen, and Tsung-Yi Ho.
Sgattack
⭐
5
Official Repository for "Adversarial Attack on Large Scale Graph." [TKDE 2021]
Transferable_perturbations
⭐
5
[NeurIPS2021] Code Release of Learning Transferable Perturbations
Adv Examples Fun
⭐
5
Try to generate adversarial images in your browser for fun and profit.
Linkteller
⭐
5
LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
Adversarial_robustness_zsl
⭐
5
[ECCV 2020 AROW Workshop] A Deep Dive into Adversarial Robustness in Zero-Shot Learning
Keras_adversarial_attack
⭐
5
Implementation of (2014) Explaining and Harnessing Adversarial Examples.
Interval Bound Propagation Chainer
⭐
5
Sven Gowal et al., Scalable Verified Training for Provably Robust Image Classification, ICCV 2019
Mcs_2018_adversarial_attack
⭐
5
MCS 2018. Adversarial Attacks on Black Box Face Recognition
Paper Reading Dl Security
⭐
5
简单记录一下读过的DL-Security相关比较有意思的paper,方便以后要用的时候找到
U6da
⭐
5
official Pytorch implementation of paper 'Adversarial samples for deep monocular 6D object pose estimation'
201-290 of 290 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.