Implementation of different adversarial attack and defense types from "Towards Evaluating the Robustness of Neural Networks" and "Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods" papers.
Completed as a part of Security and Interpretability of Machine Learning course, Innopolis University, Fall 2021