Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for deep learning attack
attack
x
deep-learning
x
55 search results found
One Pixel Attack Keras
⭐
1,078
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
Deeprobust
⭐
904
A pytorch adversarial library for attack and defense methods on images and graphs
Backdoor Learning Resources
⭐
888
A list of backdoor learning resources
Graph Adversarial Learning Literature
⭐
772
A curated list of adversarial attacks and defenses papers on graph-structured data.
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Awesome Ml Privacy Attacks
⭐
488
An awesome list of papers on privacy attacks against machine learning
Awesome Graph Attack Papers
⭐
315
Adversarial attacks and defenses on Graph Neural Networks.
Trojanzoo
⭐
260
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Adversarial Explainable Ai
⭐
235
💡 Adversarial attacks on explanations and how to defend them
Pro Gnn
⭐
213
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Tensorflow Adversarial
⭐
204
Crafting adversarial images
Nettack
⭐
187
Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".
Deep Spying
⭐
173
Spying using Smartwatch and Deep Learning
Privacyraven
⭐
172
Privacy Testing for Deep Learning
Defensegan
⭐
164
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)
Adversarial Examples Reading List
⭐
141
This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.
Gnn Meta Attack
⭐
106
Implementation of the paper "Adversarial Attacks on Graph Neural Networks via Meta Learning".
Trojai Literature
⭐
102
Disrupting Deepfakes
⭐
75
🔥🔥Defending Against Deepfakes Using Adversarial Attacks on Conditional Image Translation Networks
Awesome Fools
⭐
73
💀 A collection of methods to fool the deep neural network 💀
Adversarial Learning Robustness
⭐
71
Contains materials for workshops pertaining to adversarial robustness in deep learning.
Awesome Adversarial Deep Learning
⭐
68
A list of awesome resources for adversarial attack and defense method in deep learning
Deepipr
⭐
67
This is the code repo of our NeurIPS2019 work that proposes novel passport-based DNN ownership verification schemes, i.e. we embed passport layer into various deep learning architectures (e.g. AlexNet, ResNet) for Intellectual Property Right (IPR) protection.
Jpeg Defense
⭐
65
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Mtcnnattack
⭐
57
The first real-world adversarial attack on MTCNN face detetction system to date
Awesome 3d Point Cloud Attacks
⭐
56
List of state of the art papers, code, and other resources
Pixel Deflection
⭐
54
Deflecting Adversarial Attacks with Pixel Deflection
Robust And Explainable Machine Learning
⭐
48
Related materials for robust and explainable machine learning
Gan Attack Against Federated Deep Learning
⭐
46
The reproduction of the paper Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.
Dropout_bbalpha
⭐
41
Implementations of the ICML 2017 paper (with Yarin Gal)
Adversarial Attack Algorithms
⭐
39
Pcl Adversarial Defense
⭐
36
Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019
Acl18_results
⭐
30
Code to reproduce results in our ACL 2018 paper "Did the Model Understand the Question?"
Ijcnn19attacks
⭐
29
Adversarial Attacks on Deep Neural Networks for Time Series Classification
Ai Security Related Paper List
⭐
29
Papers I have collected and read in undergraduate and graduate period
If Defense
⭐
28
This is the official pytorch implementation for paper: IF-Defense: 3D Adversarial Point Cloud Defense via Implicit Function based Restoration
Input Aware Backdoor Attack Release
⭐
27
Input-aware Dynamic Backdoor Attack (NeurIPS 2020)
One Pixel Attack Pytorch
⭐
26
Pytorch reimplementation of "One pixel attack for fooling deep neural networks"
Security And Robustness Of Deep Learning In Wireless Communication Systems
⭐
26
A research oriented repository on the Security and Robustness of Deep Learning for Wireless Communication Systems
Adversarial Transformation Network
⭐
25
A simple implement of an Adversarial Autoencoding ATN(AAE ATN)
Advanced Gradient Obfuscating
⭐
25
Take further steps in the arms race of adversarial examples with only preprocessing.
Dfst
⭐
23
This is the repository for DFST paper Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification.
Gard Adversarial Speaker Id
⭐
22
Adversarial attack and defense strategies for deep speaker recognition systems
Deep Co Training For Semi Supervised Image Recognition
⭐
22
Unofficial implementation of the paper 'Deep Co-Training for Semi-Supervised Image Recognition'
Adversarial Point Perturbations On 3d Objects
⭐
19
New distributional and shape attacks on neural networks that process 3D point cloud data.
Website Fingerprinting
⭐
19
Automatic Feature Generation for Website Fingerprinting
Adversarial_learning_paper
⭐
19
Paper Collection of Adversarial Machine Learning
Bluff
⭐
16
Bluff: Interactively Deciphering Adversarial Attacks on Deep Neural Networks
Attack Imagenet
⭐
15
No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.
Reinlife
⭐
15
Creating Artificial Life with Reinforcement Learning
Advpc
⭐
14
AdvPC: Transferable Adversarial Perturbations on 3D Point Clouds (ECCV 2020)
Adv Dnn Ens Malware
⭐
13
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Pgd Pytorch
⭐
13
A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"
Dhta Master
⭐
12
The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.
Adverserial_attack
⭐
12
Different Adversarial attack methods implemented in PyTorch on CIFAR-10 Dataset
Federated Learning
⭐
12
Related material on Federated Learning
Robustbnns
⭐
12
Code for paper "Robustness of Bayesian Neural Networks to Gradient-Based Attacks"
Awesome Aml
⭐
12
A curated list of awesome adversarial attack and defense papers
Fi Cyberspace Scan
⭐
11
Surgical python tool to assist in LFI discovery
3d Neural Network Adversarial Attacks
⭐
11
Research on adversarial attacks and defenses for deep neural network 3D point cloud classifiers like PointNet and PointNet++.
Simple Deep Learning Sca
⭐
10
Simple deep learning side channel attack. Experimental data set based on chipwhisperer.
Ensemble_adversarial_attack
⭐
10
Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets
Fdia Pdm
⭐
10
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Iterativesalienceocclusion
⭐
9
Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks
Snn Adversarial Attacks
⭐
9
Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters
Sada
⭐
9
SADA: Semantic Adversarial Diagnostic Attacks for Autonomous Applications (AAAI 2020)
Zeroe
⭐
9
From Hero to Zéroe: A Benchmark of Low-Level Adversarial Attacks
Tik_tok
⭐
9
This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in PETS 2020.
Sentinelone Queries
⭐
8
Repository of SentinelOne Deep Visibility queries.
Pytorch Gnn Meta Attack
⭐
8
Pytorch implementation of gnn meta attack (mettack). Paper title: Adversarial Attacks on Graph Neural Networks via Meta Learning.
Vnondb Extractor
⭐
8
VNOnDB dataset extractor. This dataset can be use for build deep learning model to attack vietnamese handwritten text recognition problem.
Adversarialattackinceptionv3
⭐
8
Attack InceptionV3 net using FGM( fast gradient method) and show saliency maps.
Awesome_backdoorattack_against_neuralnetwork
⭐
8
A paper summary of Backdoor Attack against Neural Network
Vanilla Adversarial Training
⭐
8
vanilla training and adversarial training in PyTorch
Robustadversarialnetwork
⭐
7
A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"
Fda
⭐
7
Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq
Strip
⭐
7
This is for releasing the source code of the ACSAC paper "STRIP: A Defence Against Trojan Attacks on Deep Neural Networks"
Pa Gnn
⭐
7
Implementation of paper "Transferring Robustness for Graph Neural Network Against Poisoning Attacks".
Fine Pruning Defense
⭐
7
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)
Datasouls_antispoof
⭐
6
Code and pre-trained models for detecting spoofing attacks from images.
Pad Lstm
⭐
6
Thesis work using Deep Learning to detect attacks to face recognition systems (CNN+LSTM)
Med Attack
⭐
6
Implementation for paper Identify Susceptible Locations in Medical Records via Adversarial Attacks on Deep Predictive Models
Integration Of Adversarial Attacks In Training Pipeline
⭐
6
Use a Jupyter notebook to integrate the Adversarial Robustness Toolbox (ART) into a neural network model training pipeline with Fabric for Deep Learning to find model vulnerabilities.
Mamo Forensictransfer
⭐
6
auto-encoder-based forgery detection tool for mammogram images
Awesome Autoencoders For Representation Learning
⭐
6
A curated list on the literature of autoencoders for representation learning.
Cw Pytorch
⭐
6
A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"
Keras_adversarial_attack
⭐
5
Implementation of (2014) Explaining and Harnessing Adversarial Examples.
Paper Review
⭐
5
This is for the papers I review every week
Deep Learning Security Basic For Kisa
⭐
5
Interactiveadversarialexamples
⭐
5
An interactive site for exploring adversarial attacks on deep neural networks in real-time.
Deep Illusion
⭐
5
Adversarial attack toolbox for Pytorch, Tensorflow, and Jax
Related Searches
Python Deep Learning (13,092)
Jupyter Notebook Deep Learning (10,328)
Deep Learning Pytorch (6,767)
Deep Learning Tensorflow (5,868)
Deep Learning Neural Network (5,801)
Deep Learning Convolutional Neural Networks (4,142)
Deep Learning Neural (3,734)
Network Deep Learning (3,532)
Deep Learning Computer Vision (3,365)
Deep Learning Keras (3,258)
1-55 of 55 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.