HangJie720 / Ensemble_Adversarial_Attack
Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets
☆33Updated 4 years ago
Related projects: ⓘ
- ☆41Updated last year
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 3 years ago
- Paper sharing in adversary related works☆43Updated 3 weeks ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆27Updated 2 years ago
- ☆66Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆73Updated 2 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆23Updated last year
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆39Updated last year
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆34Updated last year
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆56Updated 4 years ago
- ☆48Updated 2 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆33Updated last year
- ☆76Updated 3 years ago
- ☆53Updated last year
- Public repo for transferability ICLR 2017 paper☆49Updated 5 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆52Updated 3 years ago
- Pytorch code for ens_adv_train☆15Updated 5 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 3 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆32Updated 4 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆11Updated 5 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆86Updated last year
- Code for "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples" (NDSS 2020)☆18Updated 3 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated 8 months ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆81Updated 6 months ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 5 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆67Updated 6 years ago
- ☆27Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 3 years ago