JHL-HUST / SI-NI-FGSMLinks
☆70Updated 4 years ago
Alternatives and similar repositories for SI-NI-FGSM
Users that are interested in SI-NI-FGSM are comparing it to the libraries listed below
Sorting:
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆87Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆27Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆106Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆87Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Updated 4 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆90Updated 3 years ago
- ☆41Updated last year
- ☆35Updated last year
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆25Updated last year
- Adversarial Robustness, White-box, Adversarial Attack☆50Updated 2 years ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆56Updated 3 years ago
- ☆26Updated 2 years ago
- ☆22Updated 2 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Updated 3 years ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆23Updated 2 years ago
- Code for "Adversarial Camouflage: Hiding Physical World Attacks with Natural Styles" (CVPR 2020)☆92Updated 2 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆11Updated last year
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆18Updated 2 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆40Updated last year
- Boosting Transferability through Enhanced Momentum☆14Updated last year
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- ☆35Updated 2 years ago
- Revisiting Transferable Adversarial Images (arXiv)☆123Updated 2 months ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆75Updated 3 years ago
- ☆58Updated 2 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆57Updated last year