HanGyojin / RLB-MILinks
This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.
☆39Updated 2 years ago
Alternatives and similar repositories for RLB-MI
Users that are interested in RLB-MI are comparing it to the libraries listed below
Sorting:
- ☆17Updated 2 years ago
- Code for Transferable Unlearnable Examples☆20Updated 2 years ago
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆29Updated 7 months ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 3 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆32Updated last year
- ☆28Updated 4 years ago
- Official codes for GRA (Accepted by ICCV2023)☆17Updated last year
- ☆29Updated last year
- [ICLR2023] Distilling Cognitive Backdoor Patterns within an Image☆35Updated 7 months ago
- ☆44Updated last year
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Updated 2 years ago
- The official code of IEEE S&P 2024 paper "Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferabili…☆19Updated 9 months ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆49Updated last year
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- ☆26Updated 2 years ago
- ☆29Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆25Updated last year
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated last month
- SEAT☆20Updated last year
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆25Updated last year
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆40Updated 3 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated 8 months ago
- ☆22Updated 2 years ago
- Source code for ECCV 2022 Poster: Data-free Backdoor Removal based on Channel Lipschitzness☆32Updated 2 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 4 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Updated 3 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆22Updated last year
- ☆58Updated 2 years ago
- ☆35Updated 11 months ago
- This is a codebase for I See-Through You: A Framework for Removing Foreground Occlusion in Both Sparse and Dense Light Field Images (WACV…☆17Updated last year