Neural Networks Visualization : Activation Maps, Adversarial examples...
-
Updated
Dec 20, 2017 - Jupyter Notebook
Neural Networks Visualization : Activation Maps, Adversarial examples...
Attacking machine learning system with adversarial examples.
Simple code related to adversarial examples, attacks, and defenses.
Adversarial perturbation intensity strategy achieving chosen intra-technique transferability level for logistic regression
Binary Iterative Method for Non Adversarial Attack
Make adversarial images of characters
Tracking the research progress of publicly-known adversarial attacks on machine learning, and their corresponding defences.
COPRA: Constrained Prominence Adversarial Attack and Defense on Sparse and Discrete Clinical Data
Adversarially-Built Shapelets Algorithm
adversarial deep learning
Source code for ESORICS 2020 paper "Detection by attack: Detecting adversarial samples by undercover attack"
A geometry-inspired decision-based attack
Exploring compression based defenses against adversarial attacks.
A brief study on Adversarial Attacks and python scripts to generate and study them.
Generazione di Immagini Avversariali in Tensorflow
An interpretability method for XGBoost and fault detection models
Add a description, image, and links to the adversarial-example topic page so that developers can more easily learn about it.
To associate your repository with the adversarial-example topic, visit your repo's landing page and select "manage topics."