Two adversarial images crafting algorithms are implemented with Chainer. The two attacking algorithms can be found in attacks folder.
$ python demo.py --gpu gpu
- [1]: Explaining and Harnessing Adversarial Examples, Goodfellow et al., CoRR2014
- [2]: Adversarial examples in the physical world, Kurakin et al., ICLR2017
- [1]: Cleverhans
- [2]: Implementation in tensorflow