CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.
☆12Dec 29, 2021Updated 4 years ago
Alternatives and similar repositories for Activation-Attack-Pytorch
Users that are interested in Activation-Attack-Pytorch are comparing it to the libraries listed below
Sorting:
- some baseline attack method by pytorch☆11Oct 13, 2021Updated 4 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- An unofficial implementation of the paper《Towards Understanding and Boosting Adversarial Transferability from a Distribution Perspective》☆22Nov 24, 2022Updated 3 years ago
- TheWebConf'24 full paper - "Linear-Time Graph Neural Networks for Scalable Recommendations"☆22Jul 23, 2025Updated 7 months ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- ☆37Jul 3, 2024Updated last year
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- ☆14Jan 19, 2024Updated 2 years ago
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆22Dec 12, 2022Updated 3 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆40Aug 28, 2022Updated 3 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Mar 3, 2022Updated 4 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆58Jun 3, 2020Updated 5 years ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 5 months ago
- PRICAI 2021 Full Paper —— Off-TANet:A Lightweight Neural Micro-expression Recognizer with Optical Flow Features and Integrated Attention …☆11Aug 19, 2022Updated 3 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Feature Pyramid Network for Multi-task Affective Analysis☆11Oct 30, 2021Updated 4 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- The backup repository for FairytaleQA dataset and paper "Fantastic Questions and Where to Find Them: FairytaleQA – An Authentic Dataset f…☆10May 30, 2023Updated 2 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- ☆15Apr 29, 2021Updated 4 years ago
- ☆63Aug 31, 2021Updated 4 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- ☆86Nov 7, 2025Updated 4 months ago
- Code from PLDI '21 paper "Provable Repair of Deep Neural Networks."☆10Nov 26, 2022Updated 3 years ago
- Code for generating adversarial color-shifted images☆19Nov 11, 2019Updated 6 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Benchmarking various Computer Vision models on TinyImageNet Dataset☆34Mar 24, 2023Updated 2 years ago
- This project is an implementation of our IJCAI 2021 paper "Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition", …☆75Dec 6, 2022Updated 3 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- ECNU Compiler Project: x0 compiler, implemented by lex and yacc(bison)☆11Mar 10, 2026Updated last week
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- The Charon tool for analyzing neural network robustness☆13Mar 19, 2020Updated 6 years ago
- Official Implementation of Harnessing Perceptual Adversarial Patches for Crowd Counting (ACM CCS)☆18Apr 28, 2023Updated 2 years ago
- Source code for EAC-Net in Theano/Pytorch/Tensorflow☆20Jan 16, 2018Updated 8 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago