NVlabs / A5Links
Adversarial Augmentation Against Adversarial Attacks
☆32Updated 2 years ago
Alternatives and similar repositories for A5
Users that are interested in A5 are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Updated 3 years ago
- ☆42Updated last year
- Demo code for the paper: One Thing to Fool them All: Generating Interpretable, Universal, and Physically-Realizable Adversarial Features☆12Updated 2 years ago
- Single Image Backdoor Inversion via Robust Smoothed Classifiers☆17Updated 2 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Updated 3 years ago
- ☆20Updated 2 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆44Updated 2 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆24Updated 2 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated 2 years ago
- ☆69Updated last year
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆114Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34Updated 2 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Updated 4 years ago
- Robust Principles: Architectural Design Principles for Adversarially Robust CNNs☆23Updated last year
- Official code for the ICCV2023 paper ``One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training''☆20Updated 2 years ago
- Code of our CVPR 2022 paper "Shadows can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Natural Phenomenon"☆64Updated 3 months ago
- Official implementation of "When Adversarial Training Meets Vision Transformers: Recipes from Training to Architecture" published at Neur…☆37Updated last year
- A Self-Consistent Robust Error (ICML 2022)☆69Updated 2 years ago
- CelebA HQ Face Identity and Attributes Recognition using PyTorch☆41Updated 2 years ago
- ☆16Updated 3 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Updated 2 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆74Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Updated 2 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated 2 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Updated 4 years ago
- This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/ab…☆44Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆74Updated 3 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆17Updated 3 years ago