Bob-cheng / BadPartLinks
"BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks"
☆11Updated last year
Alternatives and similar repositories for BadPart
Users that are interested in BadPart are comparing it to the libraries listed below
Sorting:
- Artifacts for SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations☆27Updated 4 years ago
- [ICLR 2025] REFINE: Inversion-Free Backdoor Defense via Model Reprogramming☆11Updated 9 months ago
- A paper summary of Backdoor Attack against Neural Network☆13Updated 6 years ago
- ☆25Updated 2 years ago
- Morphence: An implementation of a moving target defense against adversarial example attacks demonstrated for image classification models …☆23Updated last year
- This is an implementation demo of the IJCAI 2022 paper [Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation …☆21Updated last year
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆63Updated 6 years ago
- ☆29Updated 2 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Updated 2 years ago
- How Robust are Randomized Smoothing based Defenses to Data Poisoning? (CVPR 2021)☆14Updated 4 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 5 years ago
- MSF-ADV is a novel physical-world adversarial attack method, which can fool the Multi Sensor Fusion (MSF) based autonomous driving (AD) p…☆80Updated 4 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated 2 years ago
- The code of our paper: 'Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples', in Tensorflow.☆51Updated 6 months ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆48Updated 7 years ago
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Updated 3 years ago
- AdvDoor: Adversarial Backdoor Attack of Deep Learning System☆32Updated last year
- Example of the attack described in the paper "Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization"☆21Updated 6 years ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆10Updated 2 years ago
- [S&P'24] Test-Time Poisoning Attacks Against Test-Time Adaptation Models☆18Updated 9 months ago
- In the repository we provide a sample code to implement the Targeted Bit Trojan attack.☆19Updated 5 years ago
- ☆68Updated 5 years ago
- Official Inplementation of CVPR23 paper "Backdoor Defense via Deconfounded Representation Learning"☆25Updated 2 years ago
- Craft poisoned data using MetaPoison☆54Updated 4 years ago
- This is the implementation for CVPR 2022 Oral paper "Better Trigger Inversion Optimization in Backdoor Scanning."☆24Updated 3 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆21Updated 6 years ago
- ☆24Updated 3 years ago
- Code for ML Doctor☆91Updated last year
- This is the official implementation of our paper 'Untargeted Backdoor Watermark: Towards Harmless and Stealthy Dataset Copyright Protecti…☆58Updated last year
- ☆19Updated 4 years ago