Sizhe-Chen / AAAView external linksLinks
official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks"
☆20Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for AAA
Users that are interested in AAA are comparing it to the libraries listed below
Sorting:
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆15Dec 19, 2022Updated 3 years ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- Adversarial Robustness on In- and Out-Distribution Improves Explainability☆12Feb 10, 2022Updated 4 years ago
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 2 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆20Updated this week
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- A Self-Consistent Robust Error (ICML 2022)☆69Jun 25, 2023Updated 2 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19May 23, 2022Updated 3 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago
- ☆18Mar 24, 2023Updated 2 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- Paper sharing in adversary related works☆45Aug 14, 2025Updated 6 months ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- Adversarial Ranking Attack and Defense, ECCV, 2020.☆24Sep 16, 2021Updated 4 years ago
- ☆58Jul 27, 2022Updated 3 years ago
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆26Jun 30, 2020Updated 5 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆115Jul 21, 2022Updated 3 years ago
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆27Mar 16, 2022Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- Iwara网站数据爬取及本地化☆10Nov 23, 2022Updated 3 years ago
- A list of papers in NeurIPS 2022 related to adversarial attack and defense / AI security.☆75Dec 5, 2022Updated 3 years ago
- ☆37Aug 4, 2020Updated 5 years ago
- A Universal Adversarial Dataset☆35Oct 26, 2020Updated 5 years ago
- ☆36Feb 23, 2024Updated last year
- Adversarial Examples: Attacks and Defenses for Deep Learning☆31Apr 26, 2018Updated 7 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- [TPAMI 2023] Low Dimensional Landscape Hypothesis is True: DNNs can be Trained in Tiny Subspaces☆43Jun 29, 2022Updated 3 years ago
- Targeted black-box adversarial attack using Bayesian Optimization☆38Jun 14, 2020Updated 5 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Oct 1, 2022Updated 3 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆48Nov 30, 2022Updated 3 years ago