Mishne-Lab / SOAPLinks
Implementation of Self-supervised-Online-Adversarial-Purification
☆13Updated 4 years ago
Alternatives and similar repositories for SOAP
Users that are interested in SOAP are comparing it to the libraries listed below
Sorting:
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 4 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Updated last year
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆34Updated 5 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Updated 4 years ago
- Pytorch implementation of Adversarially Robust Distillation (ARD)☆59Updated 6 years ago
- ☆58Updated 3 years ago
- Universal Adversarial Networks☆32Updated 7 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Updated 4 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆74Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Updated 5 years ago
- ☆11Updated 3 years ago
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆29Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago
- ☆13Updated 4 years ago
- Implementation of Wasserstein adversarial attacks.☆24Updated 5 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- ☆19Updated 4 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Updated 4 years ago
- ☆57Updated 2 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- ConvexPolytopePosioning☆37Updated 6 years ago
- ☆35Updated 5 years ago
- the paper "Geometry-aware Instance-reweighted Adversarial Training" ICLR 2021 oral☆59Updated 4 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Updated 5 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆10Updated 6 years ago
- ☆42Updated 2 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Updated 5 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Updated 3 years ago
- ☆25Updated 7 years ago
- Attacks using out-of-distribution adversarial examples☆11Updated 6 years ago