Harry24k / RFGSM-pytorchLinks
A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"
☆10Updated 6 years ago
Alternatives and similar repositories for RFGSM-pytorch
Users that are interested in RFGSM-pytorch are comparing it to the libraries listed below
Sorting:
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 5 years ago
- ☆27Updated 3 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Updated 4 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Updated 5 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Updated 5 years ago
- ☆58Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated 2 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Updated 2 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Updated 3 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Updated 6 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Updated 3 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 5 years ago
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Updated 3 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 5 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Updated 4 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆87Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Updated 5 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Updated 3 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Updated last year
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Updated last year
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Updated 6 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Updated 4 years ago