☆63Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-adversarial-attack-and-defense-papers
Users that are interested in awesome-adversarial-attack-and-defense-papers are comparing it to the libraries listed below
Sorting:
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.☆27Jan 9, 2023Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212May 27, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- This repository is related to the paper titled "Detecting Out-of-Distribution Inputs in Deep Neural Networks Using an Early-Layer Output"…☆12Apr 14, 2023Updated 2 years ago
- Using FGSM, I-FGSM and MI-FGSM to generate and evaluate adversarial samples.☆12Jul 22, 2019Updated 6 years ago
- [ICLR 2022] Training L_inf-dist-net with faster acceleration and better training strategies☆22Mar 16, 2022Updated 4 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 7 months ago
- torch.optim.lr_scheduler☆10Mar 17, 2020Updated 6 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated this week
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆28Nov 25, 2022Updated 3 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 4 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- [CVPR 2024] "Data Poisoning based Backdoor Attacks to Contrastive Learning": official code implementation.☆16Feb 10, 2025Updated last year
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 5 years ago
- A Python library for adversarial machine learning focusing on benchmarking adversarial robustness.☆526Oct 15, 2023Updated 2 years ago
- ☆12Mar 15, 2019Updated 7 years ago
- A pytorch implementation of "Towards Deep Learning Models Resistant to Adversarial Attacks"☆159Sep 4, 2019Updated 6 years ago
- RobustBench: a standardized adversarial robustness benchmark [NeurIPS 2021 Benchmarks and Datasets Track]☆772Mar 31, 2025Updated 11 months ago
- Paper list of Adversarial Examples☆52Oct 12, 2023Updated 2 years ago
- Official PyTorch Implementation of PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection (CVPR 2025).☆34Jul 7, 2025Updated 8 months ago
- Official implementation of (CVPR 2022 Oral) Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks.☆26Jul 3, 2025Updated 8 months ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆743May 16, 2024Updated last year
- [CVPR-25🔥] Test-time Counterattacks (TTC) towards adversarial robustness of CLIP☆40Jun 4, 2025Updated 9 months ago
- ☆79Oct 20, 2019Updated 6 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆20May 21, 2019Updated 6 years ago
- [ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yi…☆13Jul 17, 2024Updated last year
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 2 years ago
- ☆22Jul 28, 2020Updated 5 years ago
- ☆18Feb 10, 2022Updated 4 years ago
- Official implementation of Segmentation and Complete (SAC) defense.☆26Nov 13, 2023Updated 2 years ago
- Latent Space Virtual Adversarial Training (ECCV 2020)☆17Nov 12, 2020Updated 5 years ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆14May 12, 2025Updated 10 months ago