HanGyojin / RLB-MILinks
This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.
☆38Updated 2 years ago
Alternatives and similar repositories for RLB-MI
Users that are interested in RLB-MI are comparing it to the libraries listed below
Sorting:
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆25Updated 5 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Updated 2 years ago
- ☆58Updated 2 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆36Updated last year
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆43Updated 4 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆143Updated 2 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆117Updated 3 years ago
- [CVPR 2023] Backdoor Defense via Adaptively Splitting Poisoned Dataset☆48Updated last year
- ☆31Updated last year
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆28Updated 9 months ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆92Updated last week
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆35Updated 5 months ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆60Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆62Updated 4 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Updated 3 years ago
- Code for "Variational Model Inversion Attacks" Wang et al., NeurIPS2021☆22Updated 3 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 5 years ago
- ☆59Updated 2 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆111Updated 3 years ago
- Official implementation of "When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture" published at Neur…☆34Updated last year
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Code for Transferable Unlearnable Examples☆21Updated 2 years ago
- ☆40Updated last year
- The MCG black-box attack framework published in TPAMI 2022☆36Updated 2 years ago
- ☆30Updated 3 years ago
- ☆29Updated 4 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Updated 2 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Updated 2 years ago
- ☆35Updated last year