This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"
☆30Mar 20, 2020Updated 6 years ago
Alternatives and similar repositories for Big-but-Invisible-Adversarial-Attack
Users that are interested in Big-but-Invisible-Adversarial-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23Sep 1, 2020Updated 5 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 3 years ago
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆54Oct 12, 2020Updated 5 years ago
- ☆72May 18, 2021Updated 4 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆63Jul 29, 2020Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Code for attacking state-of-the-art face-recognition system from our paper: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "Accessorize …☆61Mar 9, 2019Updated 7 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆35Mar 14, 2021Updated 5 years ago
- Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks☆16May 26, 2020Updated 5 years ago
- Code for ICML2019 Paper "On the Convergence and Robustness of Adversarial Training"☆34Apr 28, 2020Updated 6 years ago
- Code for Semantic Adversarial Attacks☆11Oct 12, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- Official code of paper "MaskSim: Detection of synthetic images by masked spectrum similarity analysis", CVPRW 2024.☆16Jul 16, 2025Updated 9 months ago
- ☆14Apr 18, 2022Updated 4 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Feb 1, 2023Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- ☆13Oct 21, 2021Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆94Mar 24, 2023Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Improving Transferability of Adversarial Examples with Input Diversity☆168Apr 30, 2019Updated 7 years ago
- ☆84Aug 3, 2021Updated 4 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- Robust Adversarial Objects against Deep Learning Models☆11Mar 28, 2020Updated 6 years ago
- [NeurIPS2022] Perceptual Attacks of No-Reference Image Quality Models with Human-in-the-Loop☆14Apr 13, 2023Updated 3 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆99Mar 1, 2022Updated 4 years ago
- ☆107Jan 23, 2022Updated 4 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆51Nov 2, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Official implementation for Neural networks with recurrent generative feedback (NeurIPS 2020).☆22Nov 10, 2020Updated 5 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- Tools for using AD to optimize tensor networks, built on top of ITensor and AutoHOOT.☆14Sep 23, 2022Updated 3 years ago
- Implementation of AGNs, proposed in: M. Sharif, S. Bhagavatula, L. Bauer, M. Reiter. "A General Framework for Adversarial Examples with O…☆36Sep 19, 2020Updated 5 years ago
- Code for implemeting a conditional DDPM trained on CIFAR10☆14Jan 15, 2024Updated 2 years ago
- ☆29Jun 27, 2022Updated 3 years ago
- Code for the NeurIPS 2023 paper "Spatial-frequency channels, shape bias, and adversarial robustness"☆14Nov 5, 2023Updated 2 years ago