SCLBD / MCG-BlackboxView external linksLinks
The MCG black-box attack framework published in TPAMI 2022
☆37Jan 17, 2023Updated 3 years ago
Alternatives and similar repositories for MCG-Blackbox
Users that are interested in MCG-Blackbox are comparing it to the libraries listed below
Sorting:
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆59Jun 18, 2021Updated 4 years ago
- Robust Camera Trace Extraction (TIFS'23)☆12Oct 3, 2023Updated 2 years ago
- The official pytorch implementation of ACM MM 19 paper "MetaAdvDet: Towards Robust Detection of Evolving Adversarial Attacks"☆11Jun 7, 2021Updated 4 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- ☆47Feb 21, 2020Updated 5 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Att…☆20Oct 28, 2022Updated 3 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- ☆47Nov 17, 2022Updated 3 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Official repository of "Beyond Spatial Frequency: Pixel-wise Temporal Frequency-based Deepfake Video Detection" [ICCV 2025]☆20Jan 17, 2026Updated 3 weeks ago
- ☆10May 14, 2023Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 4 years ago
- ☆22Dec 12, 2022Updated 3 years ago
- ☆15Oct 21, 2021Updated 4 years ago
- ☆14Apr 11, 2018Updated 7 years ago
- ☆14Jan 4, 2025Updated last year
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- [ICASSP 2022] Official PyTorch Implementation for "Attention Probe: Vision Transformer Distillation in the Wild" (ICASSP 2022)☆11Jan 23, 2022Updated 4 years ago
- pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain☆11Oct 30, 2022Updated 3 years ago
- Boosting Transferability through Enhanced Momentum☆14Feb 23, 2024Updated last year
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Oct 3, 2023Updated 2 years ago
- [CVPR 2023] GLeaD: Improving GANs with A Generator-Leading Task☆32Jun 5, 2023Updated 2 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- Adversarial Detection v.s. Object Detection.☆14Jul 29, 2023Updated 2 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆200Mar 27, 2023Updated 2 years ago
- A collection of resources on generation.☆13Oct 9, 2022Updated 3 years ago
- Generative Regional Editing (GRE) Benchmark☆18Sep 10, 2024Updated last year
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆256Nov 23, 2025Updated 2 months ago
- ☆64Jan 6, 2022Updated 4 years ago
- ☆36Jun 14, 2023Updated 2 years ago