[ICCV 2023] "TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization", Yiran Liu, Xin Feng, Yunlong Wang, Wu Yang, Di Ming*
☆13Jul 17, 2024Updated last year
Alternatives and similar repositories for TRMUAP
Users that are interested in TRMUAP are comparing it to the libraries listed below
Sorting:
- ☆10Apr 6, 2024Updated last year
- ☆20Aug 7, 2023Updated 2 years ago
- [ACM MM 2023] Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer.☆22Feb 23, 2024Updated 2 years ago
- ☆23Apr 7, 2025Updated 10 months ago
- A PyTorch implementation of universal adversarial perturbation (UAP) which is more easy to understand and implement.☆53Mar 3, 2022Updated 3 years ago
- Official implementation of the ICCV2023 paper: Enhancing Generalization of Universal Adversarial Perturbation through Gradient Aggregatio…☆27Aug 17, 2023Updated 2 years ago
- [NeurIPS 2025] The official implementation of the paper "DRIFT: Dynamic Rule-Based Defense with Injection Isolation for Securing LLM Agen…☆39Feb 14, 2026Updated 2 weeks ago
- A novel physical adversarial attack tackling the Digital-to-Physical Visual Inconsistency problem.☆10Feb 5, 2025Updated last year
- ☆15Feb 11, 2025Updated last year
- Official implementation of "Label Poisoning is All You Need".☆11Jan 4, 2024Updated 2 years ago
- Disguising Attacks with Explanation-Aware Backdoors (IEEE S&P 2023)☆11Jan 3, 2026Updated last month
- Code repository for Blackbox Attacks via Surrogate Ensemble Search (BASES), NeurIPS 2022☆13Aug 6, 2024Updated last year
- ☆20Feb 3, 2025Updated last year
- The Project of Our ICCV Paper☆10Nov 10, 2020Updated 5 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- ☆11Dec 8, 2022Updated 3 years ago
- PatchBackdoor is a code base associated with paper PatchBackdoor.☆12Aug 27, 2024Updated last year
- 使用cNN对交通标志进行分类☆12Apr 9, 2018Updated 7 years ago
- Classification, Object Detection, Adversarial Attack of Chinese Traffic Signs // 中式交通标志图片的分类、目标检测、对抗性攻击☆10Aug 12, 2020Updated 5 years ago
- [CCS'24] Official Implementation of "Fisher Information guided Purification against Backdoor Attacks"☆14Oct 29, 2025Updated 4 months ago
- ☆12Mar 5, 2024Updated last year
- This repo is the official implementation of the ICLR'23 paper "Towards Robustness Certification Against Universal Perturbations." We calc…☆12Feb 14, 2023Updated 3 years ago
- Official frontend web application for Moltbook - The Social Network for AI Agents. Built with Next.js 14, TypeScript, Tailwind CSS featur…☆34Feb 1, 2026Updated last month
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- [USENIX Security 2022] Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture☆16Aug 29, 2022Updated 3 years ago
- Code for our NeurIPS 2023 paper Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly☆14Jan 22, 2024Updated 2 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated 2 years ago
- A Generated Face Dataset: AGFD-20K. A Realistic, High-resolution, Vary & Balanced face dataset, generated by stable diffusion.☆11Nov 5, 2023Updated 2 years ago
- CLIP-based simple image-text matching baseline for COCO and F30K☆14Sep 16, 2021Updated 4 years ago
- Image Classification Codebase with PyTorch☆15Sep 10, 2025Updated 5 months ago
- The official implementation of CVPR 2025 paper "Invisible Backdoor Attack against Self-supervised Learning"☆17Jul 5, 2025Updated 7 months ago
- Code for Visual Information Hiding Based on Obfuscating Adversarial Perturbations☆13Jan 9, 2024Updated 2 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Aug 28, 2021Updated 4 years ago
- A very limited implementation of arXiv:1904.00759☆13Dec 2, 2019Updated 6 years ago
- ☆21Mar 20, 2025Updated 11 months ago
- ☆14Jun 6, 2023Updated 2 years ago
- Jailbreak Evo☆21Jun 2, 2025Updated 9 months ago
- Code for the paper "Understanding the Role of Momentum in Stochastic Gradient Methods"☆14Oct 27, 2019Updated 6 years ago
- [CVPR'24] LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning☆15Jan 15, 2025Updated last year