Yanxing-Shi / Awesome-CV-Adversarial-Attack-List
This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.
☆27Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Awesome-CV-Adversarial-Attack-List
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆56Updated 4 years ago
- white box adversarial attack☆37Updated 3 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆40Updated 7 months ago
- PyTorch library for adversarial attack and training☆141Updated 5 years ago
- ☆42Updated 3 years ago
- ☆71Updated 2 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 5 years ago
- The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training tec…☆146Updated 2 years ago
- ☆13Updated 2 years ago
- ☆41Updated last year
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- ☆35Updated 3 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 4 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- MCS 2018. Adversarial Attacks on Black Box Face Recognition☆16Updated 6 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 3 years ago
- CAAD 2018 winning submissions☆35Updated 5 years ago
- ☆55Updated 2 years ago
- StrAttack, ICLR 2019☆32Updated 5 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆97Updated 3 years ago
- ☆13Updated 5 years ago
- object detection, adversarial robustness, ICIP2021☆17Updated 3 years ago
- Improving Transferability of Adversarial Examples with Input Diversity☆161Updated 5 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆138Updated last year
- A novel data-free model stealing method based on GAN☆123Updated 2 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆34Updated last year
- Pytorch implementation of Universal Adverserial Perturbation and Fast Feature Fool☆22Updated 5 years ago
- ☆24Updated 2 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆35Updated 2 years ago
- No.5 solution to non-targeted attack in IJCAI-2019 Alibaba Adversarial AI Challenge (AAAC 2019))☆11Updated 4 years ago