PrashanthTk / AdvGAN
☆9Updated 7 years ago
Alternatives and similar repositories for AdvGAN:
Users that are interested in AdvGAN are comparing it to the libraries listed below
- code we used in Decision Boundary Analysis of Adversarial Examples https://openreview.net/forum?id=BkpiPMbA-☆27Updated 6 years ago
- ☆18Updated 5 years ago
- ☆40Updated last year
- ☆47Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 4 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Updated 3 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆23Updated 5 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 5 years ago
- ☆11Updated 5 years ago
- Code for the paper "Adversarial Training and Robustness for Multiple Perturbations", NeurIPS 2019☆47Updated 2 years ago
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆28Updated 3 years ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆57Updated 5 years ago
- ☆54Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Updated 5 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 2 years ago
- Pytorch implementation of NPAttack☆12Updated 4 years ago
- ☆13Updated 5 years ago
- AAAI 2019 oral presentation☆50Updated 7 months ago
- Code for AAAI 2018 accepted paper: "Improving the Adversarial Robustness and Interpretability of Deep Neural Networks by Regularizing the…☆55Updated 2 years ago
- ☆35Updated 4 years ago
- Code release for the ICML 2019 paper "Are generative classifiers more robust to adversarial attacks?"☆23Updated 5 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- This is the code for semi-supervised robust training (SRT).☆18Updated last year
- ☆19Updated 3 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Updated 4 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Official Repository for the CVPR 2020 paper "Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs"☆43Updated last year