Jeffkang-94 / pytorch-adversarial-attackView external linksLinks
Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)
☆104Jul 8, 2021Updated 4 years ago
Alternatives and similar repositories for pytorch-adversarial-attack
Users that are interested in pytorch-adversarial-attack are comparing it to the libraries listed below
Sorting:
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆138Dec 17, 2020Updated 5 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆37Nov 28, 2023Updated 2 years ago
- ☆10May 14, 2023Updated 2 years ago
- 百度AI安全对抗赛第一名团队示例代码,基于官方给出的PGD修改,主要内容为L2-PGD+EOT。☆11Mar 17, 2021Updated 4 years ago
- Simple pytorch implementation of FGSM and I-FGSM☆291Mar 21, 2018Updated 7 years ago
- Source code for ECML/PKDD 2020 paper "FAWA: Fast Adversarial Watermark Attack on Optical Character Recognition (OCR) Systems"☆22Dec 27, 2020Updated 5 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆159Sep 4, 2019Updated 6 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆440Jan 16, 2026Updated last month
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Mar 30, 2022Updated 3 years ago
- ☆36Feb 23, 2024Updated last year
- 阿里天池AI安全挑战第一期人脸识别攻击☆10Jun 26, 2020Updated 5 years ago
- ☆12Sep 22, 2023Updated 2 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- Using relativism to improve GAN-based Adversarial Attacks. 🦾☆44Mar 24, 2023Updated 2 years ago
- 安全AI挑战者计划第一期-人脸识别对抗 7th 方案☆24Dec 7, 2023Updated 2 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆22Apr 30, 2024Updated last year
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 3 months ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Apr 4, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- AdvAttacks; adversarial examples; FGSM;JSMA;CW;single pixel attack; local search attack;deepfool☆58Aug 8, 2019Updated 6 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Jan 17, 2019Updated 7 years ago
- 使用pytorch实现FGSM☆32Aug 13, 2021Updated 4 years ago
- The Code of ECCV2022:Enhanced Accuracy and Robustness via Multi-Teacher Adversarial Distillation☆36Oct 23, 2025Updated 3 months ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 2 months ago
- ☆31Jun 22, 2021Updated 4 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 3 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Repository for the paper "U-Net Transplant: The Role of Pre-training for Model Merging in 3D Medical Segmentation" accepted @ MICCAI2025☆31Jun 26, 2025Updated 7 months ago
- 华中科技大学计算机视觉实验,基于卷积神经网络的手写数字识别,和快速梯度下降法(FGSM)的攻击以及基于对抗训练的防御。☆14Feb 20, 2023Updated 2 years ago
- (AAAI 2024) Transferable Adversarial Attacks for Object Detection using Object-Aware Significant Feature Distortion☆16Dec 13, 2023Updated 2 years ago
- The implementation of AttackAI in Ali Tianchi Security Competition Phase One.☆30Oct 24, 2019Updated 6 years ago
- PatchAttack (ECCV 2020)☆64May 22, 2020Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- [Preprint] "Can 3D Adversarial Logos Cloak Humans?"☆18Dec 30, 2021Updated 4 years ago
- Official Code for ART: Automatic Red-teaming for Text-to-Image Models to Protect Benign Users (NeurIPS 2024)☆23Oct 23, 2024Updated last year
- We propose a statistical consistency attack (StatAttack) against diverse DeepFake detectors.☆18Aug 16, 2023Updated 2 years ago