Lyn-L / PDUA
The Project of Our ICCV Paper
☆10Updated 4 years ago
Alternatives and similar repositories for PDUA
Users that are interested in PDUA are comparing it to the libraries listed below
Sorting:
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆30Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆61Updated 2 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆40Updated 3 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- Generalized Data-free Universal Adversarial Perturbations in PyTorch☆19Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 5 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆26Updated 3 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆34Updated 4 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆61Updated 3 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆36Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Code for the CVPR 2020 article "Adversarial Vertex mixup: Toward Better Adversarially Robust Generalization"☆13Updated 4 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆45Updated 3 years ago
- ☆45Updated 5 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 3 years ago
- ☆58Updated 2 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 6 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Updated 4 years ago
- ☆21Updated 3 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 3 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 3 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆78Updated 5 years ago
- ☆41Updated 3 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆26Updated 2 years ago
- Data-Efficient Backdoor Attacks☆18Updated 2 years ago
- ☆18Updated last year
- Code for Transferable Unlearnable Examples☆20Updated 2 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆25Updated 5 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Updated 2 years ago