TzviLederer / silent-killerLinks
Implementation of the paper Silent Killer
☆25Updated last year
Alternatives and similar repositories for silent-killer
Users that are interested in silent-killer are comparing it to the libraries listed below
Sorting:
- ☆12Updated last year
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆88Updated 2 years ago
- ☆34Updated 8 months ago
- ☆44Updated last year
- Code for "Label-Consistent Backdoor Attacks"☆57Updated 4 years ago
- ☆26Updated 2 years ago
- Official repo to reproduce the paper "How to Backdoor Diffusion Models?" published at CVPR 2023☆91Updated last month
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆23Updated 2 years ago
- A Pytroch Implementation of Some Backdoor Attack Algorithms, Including BadNets, SIG, FIBA, FTrojan ...☆19Updated 6 months ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆106Updated 2 years ago
- unformal implementation of advdiffuser☆15Updated last year
- [AAAI 2023] Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network☆29Updated 8 months ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆25Updated last year
- Official Repository for the AAAI-20 paper "Hidden Trigger Backdoor Attacks"☆127Updated last year
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆17Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 2 months ago
- Revisiting Transferable Adversarial Images (arXiv)☆123Updated 3 months ago
- ☆19Updated 2 years ago
- ☆24Updated 2 years ago
- [ICML 2023] Are Diffusion Models Vulnerable to Membership Inference Attacks?☆37Updated 9 months ago
- [NeurIPS 2023] Boosting Adversarial Transferability by Achieving Flat Local Maxima☆30Updated last year
- A curated list of papers for the transferability of adversarial examples☆70Updated 11 months ago
- [NeurIPS'2023] Official Code Repo:Diffusion-Based Adversarial Sample Generation for Improved Stealthiness and Controllability☆107Updated last year
- ☆51Updated 3 years ago
- ☆58Updated last year
- An Embarrassingly Simple Backdoor Attack on Self-supervised Learning☆16Updated last year
- WaNet - Imperceptible Warping-based Backdoor Attack (ICLR 2021)☆123Updated 7 months ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Updated 2 years ago
- Official Pytorch implementation for "Transferable Adversarial Attacks on Vision Transformers with Token Gradient Regularization" (CVPR 20…☆26Updated last year
- ☆107Updated 3 weeks ago