Pinned Repositories
1092-computer-organization-project1
1092-computer-organization-project2
AAAAnimation
An ASCII Art animation program working with FFmpeg and Qt. Some code is written in assembly.
accessorize-to-a-crime
Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition." In Proc. CCS, 2016.
AdvBox
Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and Advbox can benchmark the robustness of machine learning models. Advbox give a command line tool to generate adversarial examples with Zero-Coding.
Algorithm
boundary-attack
Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models." arXiv preprint arXiv:1712.04248 (2017).
FeatureSqueezing
Detecting Adversarial Examples in Deep Neural Networks
Introduction-to-Data-Science
**大學資料科學導論簡報與程式作業
NCU_Dorm-network-upload-notification
tsm55555's Repositories
tsm55555/accessorize-to-a-crime
Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition." In Proc. CCS, 2016.
tsm55555/auto-sync-local
Forked from pedronogs/auto-sync-drive. Implements synchronization between local folders.
tsm55555/EvadeML-Zoo
Benchmarking and Visualization Tool for Adversarial Machine Learning
tsm55555/robust_physical_perturbations
Public release of code for Robust Physical-World Attacks on Deep Learning Visual Classification (Eykholt et al., CVPR 2018)