Yanxing-Shi / Awesome-CV-Adversarial-Attack-ListLinks
This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.
☆28Updated 2 years ago
Alternatives and similar repositories for Awesome-CV-Adversarial-Attack-List
Users that are interested in Awesome-CV-Adversarial-Attack-List are comparing it to the libraries listed below
Sorting:
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 5 years ago
- white box adversarial attack☆38Updated 4 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆41Updated last year
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Updated 5 months ago
- object detection, adversarial robustness, ICIP2021☆17Updated 4 years ago
- ☆77Updated 2 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 4 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Updated 3 years ago
- [ CVPR 2021 Oral ] Pytorch implementation for "Adversarial Robustness under Long-Tailed Distribution"☆102Updated 3 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 6 years ago
- ☆35Updated 4 years ago
- PyTorch library for adversarial attack and training☆145Updated 6 years ago
- ☆107Updated 3 years ago
- ☆58Updated 2 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆36Updated 4 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆36Updated 5 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆36Updated 2 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Updated 4 years ago
- pytorch implementation of Parametric Noise Injection for adversarial defense☆43Updated 5 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆78Updated 5 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Updated 3 years ago
- ☆13Updated 5 years ago
- A novel data-free model stealing method based on GAN☆127Updated 2 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆40Updated 3 years ago
- CAAD 2018 winning submissions☆35Updated 6 years ago
- Code for "Diversity can be Transferred: Output Diversification for White- and Black-box Attacks"☆53Updated 4 years ago
- [NeurIPS'20 Oral] DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles☆55Updated 3 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆25Updated 2 years ago
- Reverse Cross Entropy for Adversarial Detection (NeurIPS 2018)☆45Updated 4 years ago
- The first comprehensive Robustness investigation benchmark on large-scale dataset ImageNet regarding ARchitecture design and Training tec…☆148Updated 3 years ago