Harry24k / CW-pytorch
A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"
☆56Updated 5 years ago
Alternatives and similar repositories for CW-pytorch:
Users that are interested in CW-pytorch are comparing it to the libraries listed below
- ☆83Updated 4 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆145Updated 4 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆50Updated 2 years ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆85Updated last year
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆89Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆81Updated 2 years ago
- Attacking a dog vs fish classification that uses transfer learning inceptionV3☆70Updated 6 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆93Updated 4 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆48Updated 2 years ago
- ☆65Updated last year
- ☆57Updated 2 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- ☆40Updated last year
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆117Updated 2 years ago
- CVPR 2021 Official repository for the Data-Free Model Extraction paper. https://arxiv.org/abs/2011.14779☆71Updated 11 months ago
- ☆70Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆29Updated 4 years ago
- A rich-documented PyTorch implementation of Carlini-Wagner's L2 attack.☆60Updated 6 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Updated 6 years ago
- Pytorch implementation for MagNet: a Two-Pronged Defense against Adversarial Examples☆15Updated 5 years ago
- ☆51Updated 3 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆37Updated 2 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Updated 5 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆62Updated 3 years ago
- Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems☆27Updated 3 years ago