Trustworthy-AI-Group / TransferAttack
TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.
☆356Updated 4 months ago
Alternatives and similar repositories for TransferAttack
Users that are interested in TransferAttack are comparing it to the libraries listed below
Sorting:
- Revisiting Transferable Adversarial Images (arXiv)☆122Updated 2 months ago
- A paper list for localized adversarial patch research☆148Updated last year
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆209Updated 6 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆105Updated 2 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆86Updated 2 years ago
- ☆105Updated last year
- A Paperlist of Adversarial Attack on Object Detection☆118Updated 2 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆202Updated last year
- [CVPR 2023] T-SEA: Transfer-based Self-Ensemble Attack on Object Detection☆105Updated 7 months ago
- A curated list of papers for the transferability of adversarial examples☆66Updated 10 months ago
- A list of recent papers about adversarial learning☆148Updated this week
- ☆73Updated 9 months ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆40Updated last year
- ☆12Updated 10 months ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆58Updated 2 years ago
- Enhancing the Self-Universality for Transferable Targeted Attacks [CVPR 2023 Paper]☆35Updated last year
- Enhancing the Transferability of Adversarial Attacks through Variance Tuning☆87Updated last year
- The repository is dedicated to tracking the latest advances in the field of Physical Adversarial Attack (PAA).☆88Updated 2 months ago
- ☆497Updated last month
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Updated 3 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆89Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 2 years ago
- ☆34Updated 2 years ago
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆127Updated last year
- ☆34Updated 7 months ago
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆124Updated 6 months ago
- Real-time object detection is one of the key applications of deep neural networks (DNNs) for real-world mission-critical systems. While D…☆134Updated 2 years ago
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆255Updated 4 months ago
- This is the official implementation of our paper Untargeted Backdoor Attack against Object Detection.☆25Updated 2 years ago
- ☆30Updated last month