An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》
☆22Nov 24, 2022Updated 3 years ago
Alternatives and similar repositories for DRA-BlackBoxAttack
Users that are interested in DRA-BlackBoxAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆117Jul 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆34Feb 23, 2024Updated 2 years ago
- This repository is the official implementation of StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model☆20Jul 30, 2024Updated last year
- EasyRobust: an Easy-to-use library for state-of-the-art Robust Computer Vision Research with PyTorch.☆338Jun 30, 2024Updated last year
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Jan 14, 2020Updated 6 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Tutorial about noisy labels for SIBGRAPI 2020☆11Nov 6, 2020Updated 5 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 8 months ago
- AdvLogo: Adversarial Patch Attack against Object Detectors based on Diffusion Models☆20Nov 8, 2025Updated 4 months ago
- A repository for the query-efficient black-box attack, SignHunter☆22Jan 15, 2020Updated 6 years ago
- ☆31Dec 8, 2022Updated 3 years ago
- A package that achieves 95%+ transfer attack success rate against GPT-4☆26Oct 24, 2024Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- ☆16May 27, 2024Updated last year
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆42Sep 9, 2023Updated 2 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- The official implementation of USENIX Security'23 paper "Meta-Sift" -- Ten minutes or less to find a 1000-size or larger clean subset on …☆20Apr 27, 2023Updated 2 years ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆24Feb 23, 2024Updated 2 years ago
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- Comparaison of adversarial training algorithms (FreeLB, FreeAT and K-PGD) on natural language tasks☆13Feb 14, 2020Updated 6 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Towards Deep Learning Models Resistant to Adversarial Attacks论文复现☆15Aug 18, 2021Updated 4 years ago
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆462Feb 27, 2026Updated last month
- Generalized Data-free Universal Adversarial Perturbations☆73Oct 5, 2018Updated 7 years ago
- Unlearnable Examples Give a False Sense of Security: Piercing through Unexploitable Data with Learnable Examples☆11Oct 14, 2024Updated last year
- A星算法及其可视化实现(python)☆14Dec 4, 2019Updated 6 years ago