Trustworthy-AI-Group / TransferAttack
TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.
☆338Updated 3 months ago
Alternatives and similar repositories for TransferAttack:
Users that are interested in TransferAttack are comparing it to the libraries listed below
- Revisiting Transferable Adversarial Images (arXiv)☆122Updated 3 weeks ago
- A paper list for localized adversarial patch research☆148Updated last year
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆84Updated 2 years ago
- ☆99Updated 11 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆101Updated 2 years ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆121Updated 4 months ago
- A list of recent papers about adversarial learning☆128Updated this week
- Invisible Backdoor Attack with Sample-Specific Triggers☆94Updated 2 years ago
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆101Updated 5 months ago
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆88Updated last month
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆39Updated last year
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆198Updated last year
- A curated list of papers for the transferability of adversarial examples☆63Updated 8 months ago
- ☆475Updated this week
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆240Updated 2 months ago
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆85Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- A Paperlist of Adversarial Attack on Object Detection☆116Updated 2 years ago
- Paper list of Adversarial Examples☆46Updated last year
- ☆69Updated 8 months ago
- ☆31Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆196Updated 5 months ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Updated 3 years ago
- Implements Adversarial Examples for Semantic Segmentation and Object Detection, using PyTorch and Detectron2☆50Updated 4 years ago
- ☆11Updated 9 months ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆125Updated last year
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆55Updated last year
- This Github repository summarizes a list of research papers on AI security from the four top academic conferences.☆108Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Updated 2 years ago