[CVPR 2024] "Transferable Structural Sparse Adversarial Attack Via Exact Group Sparsity Training", Di Ming, Peng Ren, Yunlong Wang, Xin Feng*
☆16Jun 11, 2024Updated last year
Alternatives and similar repositories for EGS-TSSA
Users that are interested in EGS-TSSA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- Code for the paper "StyLess: Boosting the Transferability of Adversarial Examples" (CVPR 2023)☆26Jun 9, 2023Updated 2 years ago
- ☆13Feb 1, 2024Updated 2 years ago
- Robust Adversarial Objects against Deep Learning Models☆12Mar 28, 2020Updated 6 years ago
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆42Aug 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- [AAAI 2024] Data-Free Hard-Label Robustness Stealing Attack☆15Mar 29, 2024Updated 2 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Code for "Adversarial attack by dropping information." (ICCV 2021)☆78Jan 13, 2022Updated 4 years ago
- PyTorch Implementation of the paper "Defining and Quantifying the Emergence of Sparse Concepts in DNNs" (CVPR 2023)☆12Dec 24, 2023Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆31Apr 22, 2022Updated 3 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆23May 25, 2023Updated 2 years ago
- The relevant codes for "GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections".☆14Mar 21, 2024Updated 2 years ago
- SVIP: Towards Verifiable Inference of Open-Source Large Language Models☆14Jun 3, 2025Updated 9 months ago
- ☆15Oct 21, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The official project website of "Small Scale Data-Free Knowledge Distillation" (SSD-KD for short, published in CVPR 2024).☆22Jun 13, 2024Updated last year
- Code that accompanies the paper Bayesian Uncertainty for Gradient Aggregation in Multi-Task Learning - Accepted to ICML2024☆15May 8, 2025Updated 10 months ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆42Nov 8, 2020Updated 5 years ago
- ☆18Dec 5, 2025Updated 3 months ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Jun 12, 2018Updated 7 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Query-Efficient Data-Free Learning from Black-Box Models☆23Mar 20, 2023Updated 3 years ago
- code for "Exploring the Devil in Graph Spectral Domain for 3D Point Cloud Attacks"☆27Aug 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆260Nov 23, 2025Updated 4 months ago
- This is the official code for the paper "Ad2Attack: Adaptive Adversarial Attack for Real-Time UAV Tracking".☆28Sep 25, 2021Updated 4 years ago
- ☆23Jun 25, 2023Updated 2 years ago
- BASAR:Black-box Attack on Skeletal Action Recognition, CVPR 2021☆20Feb 18, 2025Updated last year
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Geometric Adversarial Attacks and Defenses on 3D Point Clouds (3DV 2021)☆26Jun 25, 2023Updated 2 years ago
- ☆17Nov 27, 2025Updated 4 months ago
- ☆14Jan 19, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- code for Automatic Modulation Open Set Recognition with diffusion models☆17Jan 4, 2025Updated last year
- The most comprehensive and accurate LLM jailbreak attack benchmark by far☆22Mar 22, 2025Updated last year
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- [CVPR 2023] Understanding the Robustness of 3D Object Detection With Bird's-Eye-View Representations in Autonomous Driving☆31Apr 3, 2024Updated last year
- A study of MIMO wireless communication.☆13Feb 24, 2021Updated 5 years ago
- [S&P2025] Adversarial Robust ViT-based Automatic Modulation Recognition in Practical Deep Learning-based Wireless Systems☆18Aug 24, 2025Updated 7 months ago
- 给30卡在win下使用的tensorflow1.15的whl文件和cpp api,根据nvidia版的tf1.15改造编译,因为是魔改版,建议小心使用☆17Aug 22, 2021Updated 4 years ago