[NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback
☆35Mar 8, 2021Updated 4 years ago
Alternatives and similar repositories for LeBA
Users that are interested in LeBA are comparing it to the libraries listed below
Sorting:
- ☆42Sep 9, 2023Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- ☆47Feb 21, 2020Updated 6 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Feb 23, 2022Updated 4 years ago
- Code for "Hard Label Black-box Adversarial Attacks in Low Query Budget Regimes"☆15Dec 20, 2020Updated 5 years ago
- ☆25Mar 24, 2023Updated 2 years ago
- [ICLR'22] Representation-Agnostic Shape Fields☆17Dec 8, 2022Updated 3 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Oct 3, 2023Updated 2 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆59Jan 31, 2020Updated 6 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆524Oct 15, 2023Updated 2 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆179Oct 4, 2021Updated 4 years ago
- ☆71May 18, 2021Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Jan 15, 2020Updated 6 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆12Mar 15, 2019Updated 6 years ago
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆30Jun 9, 2017Updated 8 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 3 years ago
- ☆14Apr 18, 2022Updated 3 years ago
- Code for our MIDL 2021 submission☆17Mar 18, 2021Updated 4 years ago
- A novel data-free model stealing method based on GAN☆133Oct 11, 2022Updated 3 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Jul 7, 2021Updated 4 years ago
- StrAttack, ICLR 2019☆33Aug 4, 2019Updated 6 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 4 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Latent Space Virtual Adversarial Training (ECCV 2020)☆17Nov 12, 2020Updated 5 years ago
- [ICML 2023] "NeRFool: Uncovering the Vulnerability of Generalizable Neural Radiance Fields against Adversarial Perturbations" by Yonggan …☆18Mar 10, 2024Updated last year
- Code for "On the Trade-off between Adversarial and Backdoor Robustness" (NIPS 2020)☆17Nov 11, 2020Updated 5 years ago