PrashanthTk / AdvGAN
☆9Updated 6 years ago
Related projects: ⓘ
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 5 years ago
- ☆18Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 3 years ago
- ☆46Updated 3 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆56Updated 4 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 4 years ago
- ☆41Updated last year
- Implementation of the Biased Boundary Attack for ImageNet☆22Updated 5 years ago
- EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples☆37Updated 5 years ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆13Updated 4 years ago
- ☆53Updated last year
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆83Updated 5 years ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆54Updated 5 years ago
- AAAI 2019 oral presentation☆49Updated last month
- ☆17Updated 4 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆87Updated 5 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆52Updated 3 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆61Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆31Updated 3 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated last year
- Detect adversarial images from intermediate features in distance space☆12Updated 6 years ago
- Code for the unrestricted adversarial examples paper (NeurIPS 2018)☆63Updated 5 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- Data independent universal adversarial perturbations☆61Updated 4 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆90Updated 3 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- Robustness vs Accuracy Survey on ImageNet☆99Updated 3 years ago