TooTouch / SIDLinks
pytorch reimplementation for Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain
☆11Updated 2 years ago
Alternatives and similar repositories for SID
Users that are interested in SID are comparing it to the libraries listed below
Sorting:
- Towards Machine Unlearning Benchmarks: Forgetting the Personal Identities in Facial Recognition Systems☆62Updated 3 months ago
- [NeurIPS 2021] Official PyTorch Implementation for "Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bott…☆47Updated 2 years ago
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆43Updated 3 weeks ago
- ☆15Updated 2 years ago
- ☆53Updated 2 years ago
- ☆20Updated last year
- ICCV 2021, We find most existing triggers of backdoor attacks in deep learning contain severe artifacts in the frequency domain. This Rep…☆45Updated 3 years ago
- ☆20Updated 5 months ago
- Code for Friendly Noise against Adversarial Noise: A Powerful Defense against Data Poisoning Attacks (NeurIPS 2022)☆10Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆33Updated 4 months ago
- Robust natural language watermarking using invariant features☆26Updated last year
- ☆50Updated last year
- Reconstructive Neuron Pruning for Backdoor Defense (ICML 2023)☆39Updated last year
- This is a PyTorch implementation of the paper "Reinforcement Learning-Based Black-Box Model Inversion Attacks" accepted by CVPR 2023.☆38Updated 2 years ago
- ☆13Updated 3 years ago
- Code for identifying natural backdoors in existing image datasets.☆15Updated 3 years ago
- ☆82Updated 4 years ago
- A curated list of papers for the transferability of adversarial examples☆73Updated last year
- [CVPR 2022] Official PyTorch Implementation for "Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network"☆32Updated 2 years ago
- Reproduce multiple adversarial attack methods☆21Updated 5 years ago
- Code for the paper "Autoregressive Perturbations for Data Poisoning" (NeurIPS 2022)☆20Updated 11 months ago
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆23Updated 2 years ago
- Code for Transferable Unlearnable Examples☆20Updated 2 years ago
- Consistency Regularization for Adversarial Robustness (AAAI 2022)☆53Updated 3 years ago
- A toolbox for backdoor attacks.☆22Updated 2 years ago
- ☆12Updated last year
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆21Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆26Updated 2 years ago
- ☆21Updated 2 years ago
- ☆43Updated 2 years ago