| anishathalye/obfuscated-gradients |
846 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
|
Jupyter Notebook |
| Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples |
| utkuozbulak/pytorch-cnn-adversarial-attacks |
272 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
mit |
Python |
| Pytorch implementation of convolutional neural network adversarial attack techniques |
| gongzhitaao/tensorflow-adversarial |
204 |
|
0 |
0 |
over 7 years ago |
0 |
|
3 |
mit |
Python |
| Crafting adversarial images |
| jeromerony/fast_adversarial |
118 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
bsd-3-clause |
Python |
| Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses" |
| rwightman/pytorch-nips2017-attack-example |
80 |
|
0 |
0 |
over 8 years ago |
0 |
|
3 |
apache-2.0 |
Python |
| A PyTorch baseline attack example for the NIPS 2017 adversarial competition |
| JonasGeiping/poisoning-gradient-matching |
51 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
lgpl-2.1 |
Python |
| Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching |
| jaxball/advis.js |
39 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
mit |
JavaScript |
| [Tensorflow.js] AdVis: Exploring real-time Adversarial Attacks in the browser with Fast Gradient Sign Method. |
| YiZeng623/Advanced-Gradient-Obfuscating |
25 |
|
0 |
0 |
over 5 years ago |
0 |
|
1 |
mit |
Jupyter Notebook |
| Take further steps in the arms race of adversarial examples with only preprocessing. |
| a554b554/kWTA-Activation |
19 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
|
Python |
| AI-secure/QEBA |
15 |
|
0 |
0 |
about 5 years ago |
0 |
|
2 |
|
Python |
| Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack |