transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛
☆24Oct 24, 2021Updated 4 years ago
Alternatives and similar repositories for transfer_adv
Users that are interested in transfer_adv are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack classification models with transferability, black-box attack; unrestricted adversarial attacks on imagenet, CVPR2021 安全AI挑战者计划第六期:…☆51Jun 18, 2021Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- video_attack; Efficient Sparse Attacks on Videos using Reinforcement Learning☆15Oct 25, 2021Updated 4 years ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 6 months ago
- Patch adversarial attack; object detection; CIKM2020 安全AI挑战者计划第四期:通用目标检测的对抗攻击☆44Oct 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An adversarial robustness evaluation library on face recognition.☆113Jul 6, 2023Updated 2 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Jul 6, 2022Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆45Mar 24, 2023Updated 3 years ago
- ☆11Jan 4, 2022Updated 4 years ago
- Java inefficiency detection tool based on CPU performance monitoring counters and hardware debug register. The tool detects dead writes, …☆45Sep 1, 2021Updated 4 years ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- action recognition; video classification; LRCN; I3D☆15Aug 9, 2021Updated 4 years ago
- Physically Adversarial Infrared Patches with Learnable Shapes and Locations☆42Aug 13, 2023Updated 2 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆90Feb 23, 2024Updated 2 years ago
- Unified Adversarial Patch for Cross-modal Attacks in the Physical World (ICCV, 2023)☆45Dec 15, 2023Updated 2 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- Paper sharing in adversary related works☆46Apr 24, 2026Updated last week
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆20Aug 30, 2022Updated 3 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Original PyTorch implementation of the AdversarialMask paper☆23Apr 16, 2023Updated 3 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆119Mar 30, 2022Updated 4 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆20Dec 6, 2021Updated 4 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- ☆26Nov 4, 2024Updated last year
- 在线迁移学习算法实现☆24Mar 11, 2019Updated 7 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Jan 25, 2022Updated 4 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 3 years ago
- PyTorch implementation of adversarial patch☆215Mar 9, 2022Updated 4 years ago
- a Pytorch implementation of the paper "Generating Adversarial Examples with Adversarial Networks" (advGAN).☆277Dec 31, 2020Updated 5 years ago
- A Implementation of IJCAI-19(Transferable Adversarial Attacks for Image and Video Object Detection)☆87May 29, 2019Updated 6 years ago
- A toolbox for benchmarking trustworthiness of multimodal large language models (MultiTrust, NeurIPS 2024 Track Datasets and Benchmarks)☆174Jun 27, 2025Updated 10 months ago
- Pytorch implementation with segmentation model and adversarial attacks☆14Oct 20, 2019Updated 6 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago