ZOMIN28 / adversarial_attack_tutorialLinks
A simple tutorial on adversarial attacks against deep neural networks
☆31Updated 2 months ago
Alternatives and similar repositories for adversarial_attack_tutorial
Users that are interested in adversarial_attack_tutorial are comparing it to the libraries listed below
Sorting:
- TransferAttack is a pytorch framework to boost the adversarial transferability for image classification.☆436Updated 2 weeks ago
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Updated 3 months ago
- ☆128Updated 4 months ago
- ☆48Updated 9 months ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆94Updated 3 years ago
- [ECCV2024] Boosting Transferability in Vision-Language Attacks via Diversification along the Intersection Region of Adversarial Trajector…☆30Updated 2 months ago
- official PyTorch implement of Towards Adversarial Attack on Vision-Language Pre-training Models☆65Updated 2 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Updated 2 years ago
- A curated list of papers & resources on backdoor attacks and defenses in deep learning.☆234Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Updated last year
- A curated list of papers & resources linked to data poisoning, backdoor attacks and defenses against them (no longer maintained)☆285Updated last year
- CVPR 2025 - Anyattack: Towards Large-scale Self-supervised Adversarial Attacks on Vision-language Models☆64Updated 5 months ago
- ☆79Updated last year
- Official codes for FPR (Accepted by CVPR2025)☆12Updated 10 months ago
- ☆19Updated 2 years ago
- ☆12Updated 2 months ago
- 😎 up-to-date & curated list of awesome Attacks on Large-Vision-Language-Models papers, methods & resources.☆481Updated this week
- Awesome-Adversarial-Attack-Methods-Summary☆12Updated last year
- A curated list of papers for the transferability of adversarial examples☆76Updated last year
- ☆579Updated 6 months ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆140Updated 4 months ago
- ☆73Updated last week
- This is an official repository of ``VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models'' (NeurIPS 2…☆66Updated 10 months ago
- A list of recent papers about adversarial learning☆300Updated this week
- ☆10Updated last year
- Set-level Guidance Attack: Boosting Adversarial Transferability of Vision-Language Pre-training Models. [ICCV 2023 Oral]☆70Updated 2 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆104Updated 3 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Updated 2 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆253Updated 2 months ago
- Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment (NeurIPS 2025)☆45Updated 2 months ago