-
### Search before asking
- [X] I have searched the YOLOv8 [issues](https://github.com/ultralytics/ultralytics/issues) and [discussions](https://github.com/ultralytics/ultralytics/discussions) and fou…
-
The attacker API here can be made more simple, imho, if the adversarial training were implemented in `tf.keras.Model.train_step`. That function is called by `fit()`on every batch of data.
By using …
-
使用sitdown转知乎文章,公式转换为图片格式,导致复制到微信上特别小。
知乎文章链接:https://zhuanlan.zhihu.com/p/103593948
![image](https://user-images.githubusercontent.com/23072928/76674071-74855500-65e6-11ea-9819-b3444e5be0ee.pn…
-
Hi,
This is Bala. I have a query regarding adversarial attack.
Is there any adversarial attack that sustains/consists of added noise, after resize attack ? (adversarial image -> converting into …
-
1. Why in the code, the y of the undercover attack in the MLP stage is 0 and 1, instead of predicting the label ?the paper mentioned that the target of the undercover attack is the prediction of the m…
-
Hi @zangobot , I am using the malconv to deal with the malware family classification problem. It's a Multi-classification tasks so I modify the malconv's last fc layer's out_features dimension and I t…
-
Hi, I tried to use the pipeline to reproduce the result of GRB leaderboard but can't reach the accuracy given by the paper and grb website. There is always a 2-5% gap between the paper and my experime…
-
### Search before asking
- [x] I have searched the Ultralytics YOLO [issues](https://github.com/ultralytics/ultralytics/issues) and [discussions](https://github.com/ultralytics/ultralytics/discussion…
wntic updated
2 months ago
-
### Search before asking
- [X] I have searched the YOLOv8 [issues](https://github.com/ultralytics/ultralytics/issues) and [discussions](https://github.com/ultralytics/ultralytics/discussions) and fou…
-
### ❔ Any questions
Hi, thanks for the excellent work.
I want to know where this constraint comes from.
https://github.com/Harry24k/adversarial-attacks-pytorch/blob/c4da6a95546283992a3d1816ae76a…