official repository for the NeurIPS 2022 paper "Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks"
☆20Oct 28, 2022Updated 3 years ago
Alternatives and similar repositories for AAA
Users that are interested in AAA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆19Updated this week
- PyTorch implementation of our ICLR 2023 paper titled "Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning?".☆12Mar 13, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Universal Adversarial Dataset☆35Oct 26, 2020Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆27Jun 23, 2021Updated 4 years ago
- Modular Adversarial Robustness Toolkit☆21Jul 11, 2025Updated 8 months ago
- Reproduces BPDA attack in pytorch☆13Oct 10, 2019Updated 6 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 9 months ago
- [TMLR 2024] On the Adversarial Robustness of Camera-based 3D Object Detection☆31Apr 23, 2024Updated last year
- [NeurIPS 2022] "Adversarial Training with Complementary Labels: On the Benefit of Gradually Informative Attacks"☆13Nov 11, 2022Updated 3 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Dec 16, 2019Updated 6 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- ☆15Dec 19, 2022Updated 3 years ago
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆169Jul 2, 2020Updated 5 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆18May 23, 2022Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Apr 2, 2019Updated 6 years ago
- Official PyTorch implementation of "Towards Efficient Data Free Black-Box Adversarial Attack" (CVPR 2022)☆19Aug 30, 2022Updated 3 years ago
- A Self-Consistent Robust Error (ICML 2022)☆68Jun 25, 2023Updated 2 years ago
- [NeurIPS'20] Learning Black-Box Attackers with Transferable Priors and Query Feedback☆34Mar 8, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆31Dec 2, 2023Updated 2 years ago
- ☆18Mar 24, 2023Updated 3 years ago
- Control inverted pendulum by LQR in OpenAI Gym☆12Oct 2, 2024Updated last year
- PyTorch implementation of BPDA+EOT attack to evaluate adversarial defense with an EBM☆27Jun 30, 2020Updated 5 years ago
- This repository is the official implementation of [Natural Color Fool: Towards Boosting Black-box Unrestricted Attacks (NeurIPS'22)](http…☆26Feb 13, 2023Updated 3 years ago
- IJCV22 Attack your retrieval model via Query! They are not robust as you expected!☆48Nov 30, 2022Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆116Jul 21, 2022Updated 3 years ago
- On the effectiveness of adversarial training against common corruptions [UAI 2022]☆30May 16, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Adversarial Ranking Attack and Defense, ECCV, 2020.☆24Sep 16, 2021Updated 4 years ago
- [AAAI 2023] Official implementation of 'Anonymization for Skeleton Action Recognition'☆29Dec 29, 2022Updated 3 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆39Feb 29, 2024Updated 2 years ago
- ☆57Jul 27, 2022Updated 3 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆46Apr 15, 2025Updated 11 months ago
- ☆37Aug 4, 2020Updated 5 years ago