Lyn-L / PDUA
The Project of Our ICCV Paper
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PDUA
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 3 years ago
- ☆55Updated 2 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 4 years ago
- ☆44Updated 4 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆59Updated last year
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆39Updated 3 years ago
- The project page of paper: Universal Perturbation Attack Against Image Retrieval [ICCV 2019]☆27Updated 4 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆58Updated 3 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 5 years ago
- ☆19Updated 2 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆43Updated 2 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18Updated last year
- Code for Transferable Unlearnable Examples☆17Updated last year
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Updated 4 years ago
- ☆39Updated 2 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆97Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆26Updated 2 years ago
- Image Shortcut Squeezing: Countering Perturbative Availability Poisons with Compression☆11Updated 4 months ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆35Updated 2 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 3 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆70Updated 2 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 3 years ago
- Data-Efficient Backdoor Attacks☆18Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- The code of "Adversarial Metric Attack for Person Re-identification"☆32Updated 5 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Updated 2 years ago
- ☆10Updated 2 years ago
- The project page of paper: Aha! Adaptive History-driven Attack for Decision-based Black-box Models [ICCV 2021]☆10Updated 2 years ago