Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610
☆25Dec 16, 2025Updated 3 months ago
Alternatives and similar repositories for ViTRobust
Users that are interested in ViTRobust are comparing it to the libraries listed below
Sorting:
- ☆37Jul 3, 2024Updated last year
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Nov 19, 2022Updated 3 years ago
- Removing Adversarial Noise in Class Activation Feature Space☆14Oct 12, 2023Updated 2 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- A Pytorch implementation of the KWNG estimator☆14Jul 25, 2024Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆28Jul 18, 2023Updated 2 years ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- GECCO is a lightweight image classifier based on single MLP and graph convolutional layers. We find that our model can achieve up to 16x …☆11Jul 1, 2024Updated last year
- ☆16Feb 20, 2020Updated 6 years ago
- [ICLR 2022] "Unified Vision Transformer Compression" by Shixing Yu*, Tianlong Chen*, Jiayi Shen, Huan Yuan, Jianchao Tan, Sen Yang, Ji Li…☆55Dec 1, 2023Updated 2 years ago
- Contains code for the paper "Vision Transformers are Robust Learners" (AAAI 2022).☆122Dec 3, 2022Updated 3 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- 可逆水印论文复现☆10Nov 30, 2019Updated 6 years ago
- SURDS: Self-Supervised Attention-guided Reconstruction and Dual Triplet Loss for Writer Independent Offline Signature Verification", ICPR…☆17Jul 22, 2022Updated 3 years ago
- Code relative to "Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks"☆741May 16, 2024Updated last year
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- List of diffusion papers accepted in ECCV 2024.☆15Oct 17, 2024Updated last year
- Code for the paper "MMA Training: Direct Input Space Margin Maximization through Adversarial Training"☆34Apr 1, 2020Updated 5 years ago
- ☆15Dec 7, 2021Updated 4 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆54Feb 6, 2023Updated 3 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- ☆11Sep 10, 2024Updated last year
- Image Decomposition in GAN network(Reference:Deep Adversarial Decomposition: A Unified Framework for Separating Superimposed Images, CVPR…☆17Jul 15, 2020Updated 5 years ago
- [JAG 2024] UAD-RS: Universal adversarial defense in remote sensing based on pre-trained denoising diffusion models☆12Nov 8, 2024Updated last year
- ☆13Oct 21, 2021Updated 4 years ago
- Convenient inplementation of EigenCAM☆16Dec 10, 2022Updated 3 years ago
- Official Code for AdvRush: Searching for Adversarially Robust Neural Architectures (ICCV '21)☆12Dec 27, 2021Updated 4 years ago
- ☆14Jan 12, 2022Updated 4 years ago
- A Python project that parses Markdown files into a tree structure, then processes them into semantically meaningful text chunks.☆19Jan 9, 2025Updated last year
- Adversarial attacks including DeepFool and C&W☆13May 20, 2019Updated 6 years ago
- [ICASSP'20] DNN-Chip Predictor: An Analytical Performance Predictor for DNN Accelerators with Various Dataflows and Hardware Architecture…☆25Oct 1, 2022Updated 3 years ago
- ☆13Jul 25, 2024Updated last year
- PyTorch implementation of Spatially Transformed Adversarial Examples☆22Sep 18, 2023Updated 2 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- ☆16May 19, 2022Updated 3 years ago