Yanxing-Shi / Awesome-CV-Adversarial-Attack-List
This repository is a curated list of papers and open source code about competition for CV Adversarial Attack.
☆28Updated 2 years ago
Alternatives and similar repositories for Awesome-CV-Adversarial-Attack-List
Users that are interested in Awesome-CV-Adversarial-Attack-List are comparing it to the libraries listed below
Sorting:
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Updated 4 years ago
- object detection, adversarial robustness, ICIP2021☆17Updated 4 years ago
- No.2 solution of Tianchi ImageNet Adversarial Attack Challenge.☆41Updated last year
- PyTorch library for adversarial attack and training☆145Updated 6 years ago
- white box adversarial attack☆38Updated 4 years ago
- ☆76Updated 2 years ago
- A novel data-free model stealing method based on GAN☆127Updated 2 years ago
- StrAttack, ICLR 2019☆33Updated 5 years ago
- The project page of paper: Projection & Probability-Driven Black-Box Attack [CVPR 2020]☆15Updated 5 years ago
- [ CVPR 2021 Oral ] Pytorch implementation for "Adversarial Robustness under Long-Tailed Distribution"☆102Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Updated 3 years ago
- ☆40Updated last year
- ☆107Updated 3 years ago
- ☆35Updated 4 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 6 years ago
- [CVPR 2021] Official repository for "Prototype-supervised Adversarial Network for Targeted Attack of Deep Hashing"☆36Updated 2 years ago
- ☆58Updated 2 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Updated 5 months ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆78Updated 5 years ago
- Further improve robustness of mixup-trained models in inference (ICLR 2020)☆60Updated 4 years ago
- The implementatin of our ECCV 2020 work: Targeted Attack for Deep Hashing based Retrieval.☆28Updated 3 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Our Team (green hand) 6th Solution for CVPR-2021 AIC-VI: Unrestricted Adversarial Attacks on ImageNet☆26Updated 3 years ago
- ☆13Updated 3 years ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆40Updated 3 years ago
- CAAD 2018 winning submissions☆35Updated 6 years ago
- ☆48Updated 4 years ago
- 安全AI挑战者计划第一期-人脸识别对抗正式赛第四名 Safety AI Challenger Program Phase 1 - Face Recognition Adversarial Example the 4th Place☆69Updated 5 years ago
- An easy approach for the competition "Facial Adversary Examples" in TIANCHI☆32Updated 5 years ago