Trustworthy-AI-Group / Adversarial_Examples_Papers
A list of recent papers about adversarial learning
☆120Updated this week
Alternatives and similar repositories for Adversarial_Examples_Papers:
Users that are interested in Adversarial_Examples_Papers are comparing it to the libraries listed below
- Revisiting Transferable Adversarial Images (arXiv)☆119Updated 4 months ago
- A curated list of papers for the transferability of adversarial examples☆60Updated 7 months ago
- ☆92Updated last year
- ☆31Updated 8 months ago
- [AAAI'25 (Oral)] Jailbreaking Large Vision-language Models via Typographic Visual Prompts☆113Updated last week
- ☆41Updated 2 months ago
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆46Updated 4 months ago
- Official Implementation of ICLR 2022 paper, ``Adversarial Unlearning of Backdoors via Implicit Hypergradient''☆54Updated 2 years ago
- Composite Backdoor Attacks Against Large Language Models☆12Updated 10 months ago
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models☆110Updated last week
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆121Updated 3 months ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆28Updated last month
- Invisible Backdoor Attack with Sample-Specific Triggers☆93Updated 2 years ago
- ☆79Updated 3 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆194Updated 11 months ago
- ☆24Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆84Updated 2 years ago
- Official Tensorflow implementation for "Improving Adversarial Transferability via Neuron Attribution-based Attacks" (CVPR 2022)☆34Updated last year
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆86Updated 5 months ago
- Codes for NeurIPS 2021 paper "Adversarial Neuron Pruning Purifies Backdoored Deep Models"☆57Updated last year
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆25Updated 2 years ago
- This is an official repository for Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study (ICCV2023…☆22Updated last year
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆25Updated last year
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆23Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆233Updated last month
- ☆50Updated 3 years ago
- ☆26Updated 2 years ago
- A Leaderboard for Certifiable Robustness against Adversarial Patch Attacks☆21Updated last year
- ☆65Updated last year