AI-secure / Big-but-Invisible-Adversarial-AttackView external linksLinks
This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"
☆30Mar 20, 2020Updated 5 years ago
Alternatives and similar repositories for Big-but-Invisible-Adversarial-Attack
Users that are interested in Big-but-Invisible-Adversarial-Attack are comparing it to the libraries listed below
Sorting:
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- ☆62Aug 31, 2021Updated 4 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Oct 12, 2020Updated 5 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- ☆71May 18, 2021Updated 4 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Feb 1, 2023Updated 3 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 6 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 5 years ago
- An adversarial robustness evaluation library on face recognition.☆114Jul 6, 2023Updated 2 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- ☆83Aug 3, 2021Updated 4 years ago
- Official code of paper "MaskSim: Detection of synthetic images by masked spectrum similarity analysis", CVPRW 2024.☆16Jul 16, 2025Updated 6 months ago
- ☆14Apr 18, 2022Updated 3 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆36Mar 14, 2021Updated 4 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆167Apr 30, 2019Updated 6 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆65Jul 16, 2019Updated 6 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 4 years ago
- TrojanLM: Trojaning Language Models for Fun and Profit☆16Jun 17, 2021Updated 4 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Nov 2, 2020Updated 5 years ago
- ☆107Jan 23, 2022Updated 4 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆37Sep 19, 2020Updated 5 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- Code and Datasets for the paper "An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape" [IEEE S&P, 2…☆20Jul 23, 2025Updated 6 months ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆72Apr 5, 2018Updated 7 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Mar 1, 2022Updated 3 years ago
- TRADES (TRadeoff-inspired Adversarial DEfense via Surrogate-loss minimization)☆552Mar 30, 2023Updated 2 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51May 9, 2025Updated 9 months ago
- [AAAI2022] Code Release of Attacking Video Recognition Models with Bullet-Screen Comments☆25Mar 30, 2024Updated last year
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- Tensorflow Implementation of "LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud-based Deep Networks", …☆23Aug 28, 2021Updated 4 years ago