Adversarial Augmentation Against Adversarial Attacks
☆32May 23, 2023Updated 2 years ago
Alternatives and similar repositories for A5
Users that are interested in A5 are comparing it to the libraries listed below
Sorting:
- Official Code Implementation for the CCS 2022 Paper "On the Privacy Risks of Cell-Based NAS Architectures"☆11Nov 21, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆75Dec 5, 2022Updated 3 years ago
- Paper sharing in adversary related works☆46Aug 14, 2025Updated 6 months ago
- ☆12Nov 30, 2021Updated 4 years ago
- Git Repo with code and Dataset of the paper "On the use of Stable Diffusion for creating realistic faces: from generation to detection"☆15Mar 11, 2024Updated last year
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 3 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 2 years ago
- ☆20Oct 28, 2025Updated 4 months ago
- Modular Adversarial Robustness Toolkit☆21Jul 11, 2025Updated 7 months ago
- ☆44Apr 25, 2023Updated 2 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- HWASim is a simulator for heterogeneous systems with CPUs and Hardware Accelerators (HWAs). It is released with the DASH memory scheduler…☆19Jan 11, 2016Updated 10 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆48Nov 30, 2022Updated 3 years ago
- Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles☆20Jul 26, 2023Updated 2 years ago
- ICCV 2021☆32Oct 6, 2021Updated 4 years ago
- https://winterwindwang.github.io/Full-coverage-camouflage-adversarial-attack/☆20May 9, 2022Updated 3 years ago
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Aug 9, 2023Updated 2 years ago
- **ICASSP 2022** 《Toward Degradation-Robust Voice Conversion》Using speech enhancement and end-to-end denoising training to improve degrada…☆24Sep 27, 2022Updated 3 years ago
- Code for reproducing our paper "Are Sparse Autoencoders Useful? A Case Study in Sparse Probing"☆32Mar 31, 2025Updated 11 months ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- The official implementation of the paper "Defending Your Voice: Adversarial Attack on Voice Conversion".☆52May 15, 2024Updated last year
- ☆58Jul 27, 2022Updated 3 years ago
- [NeurIPS'20 Oral] DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles☆55Feb 25, 2022Updated 4 years ago
- A new adversarial purification method that uses the forward and reverse processes of diffusion models to remove adversarial perturbations…☆334Jan 29, 2023Updated 3 years ago
- Code for the paper "PAD: Patch-Agnostic Defense against Adversarial Patch Attacks" (CVPR 2024)☆28Apr 28, 2024Updated last year
- ☆28Sep 22, 2022Updated 3 years ago
- Code accompanying the AAAI 2021 paper "Spectral Distribution Aware Image Generation".☆24Jan 1, 2021Updated 5 years ago
- ☆25Nov 14, 2022Updated 3 years ago
- ☆35May 21, 2025Updated 9 months ago
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆33Dec 2, 2023Updated 2 years ago
- A Paperlist of Adversarial Attack on Object Detection☆125Mar 16, 2023Updated 2 years ago
- [ICLR'23] Trainability Preserving Neural Pruning (PyTorch)☆34May 21, 2023Updated 2 years ago
- A high-throughput and memory-efficient inference and serving engine for LLMs☆12Nov 14, 2025Updated 3 months ago
- ☆35Sep 23, 2022Updated 3 years ago
- Vision-Language Models Toolbox: Your all-in-one solution for multimodal research and experimentation☆12Feb 16, 2025Updated last year
- MATLAB/Octave generator of Hamming ECC coding. Output format is Verilog HDL.☆12Dec 27, 2022Updated 3 years ago
- ☆12May 6, 2022Updated 3 years ago