A simple tutorial on adversarial attacks against deep neural networks
☆32Nov 10, 2025Updated 3 months ago
Alternatives and similar repositories for adversarial_attack_tutorial
Users that are interested in adversarial_attack_tutorial are comparing it to the libraries listed below
Sorting:
- The implementation of our NeurIPS 2024 paper "DarkSAM: Fooling Segment Anything Model to Segment Nothing".☆13Nov 4, 2024Updated last year
- Code repository for Ensemble-based Blackbox Attacks on Dense Prediction (EBAD), CVPR 2023☆27May 17, 2024Updated last year
- ☆10Feb 10, 2021Updated 5 years ago
- [AAAI 2021] Initiative Defense against Facial Manipulation☆38Jun 14, 2023Updated 2 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- ☆14Dec 18, 2024Updated last year
- ☆20Sep 23, 2025Updated 5 months ago
- ☆11Dec 15, 2024Updated last year
- [ICML 2024] "Improving Accuracy-robustness Trade-off via Pixel Reweighted Adversarial Training"☆17Jun 4, 2024Updated last year
- All code and data necessary to replicate experiments in the paper BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Model…☆13Sep 16, 2024Updated last year
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆12Jun 21, 2021Updated 4 years ago
- ☆13Aug 26, 2024Updated last year
- Unofficial PyTorch implementation of the paper "Feature Importance-aware Transferable Adversarial Attacks"☆11Oct 28, 2025Updated 4 months ago
- We present **FOCI**, a benchmark for Fine-grained Object ClassIfication for large vision language models (LVLMs).☆19Jun 21, 2024Updated last year
- [TIFS 2024] DF-RAP: A Robust Adversarial Perturbation for Defending against Deepfakes in Real-world Social Network Scenarios☆19Oct 29, 2025Updated 4 months ago
- [ECCV 2022] TAFIM: Targeted Adversarial Attacks against Facial Image Manipulation☆58Dec 12, 2022Updated 3 years ago
- We develop a black-box adversarial attack method against potential deepfake models based on image-to-image translation GANs utilizing 3 o…☆16Sep 14, 2021Updated 4 years ago
- 离线文档库☆14Jun 17, 2020Updated 5 years ago
- Official repository for "Boosting Adversarial Transferability using Dynamic Cues " (ICLR 2023)☆20Aug 24, 2023Updated 2 years ago
- AutoEncoders for Event Detection (AEED): a Keras-based class for anomaly detection in water sensor networks.☆12Sep 17, 2018Updated 7 years ago
- LLMs for Wargames☆16Sep 21, 2024Updated last year
- [ACM MM2023] Code Release of GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos☆12Mar 29, 2024Updated last year
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- Official PyTorch Implementaion of Generative Perturbation Network for Signal-Agnostic/Specific Adversarial Attacks on EEG-based Brain-Com…☆16Dec 6, 2022Updated 3 years ago
- Benchmarking general decision-making with open & random worlds☆19Updated this week
- Falcon9 soft landing simulation based on Simulink and FlightGear☆21Aug 11, 2020Updated 5 years ago
- Tools for running experiments on RL agents in procgen environments☆20Apr 5, 2024Updated last year
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆23Jul 29, 2025Updated 7 months ago
- A Pytorch implementation of ViT - VisionTransformer☆14Aug 19, 2022Updated 3 years ago
- 【NEW】https://github.com/ctfhub-team/base_web_nginx_mysql_php_56 https://github.com/ctfhub-team/base_web_nginx_mysql_php_74☆20Sep 22, 2020Updated 5 years ago
- 首个中文心理咨询对话安全检测数据集☆23Nov 7, 2023Updated 2 years ago
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆18Mar 12, 2025Updated 11 months ago
- ☆22Aug 16, 2024Updated last year
- Oral presentation at KDD Cup Workshop @ KDD 2022☆21Aug 23, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- The code for the Ensemble everything everywhere: Multi-scale aggregation for adversarial robustness paper☆21Nov 8, 2024Updated last year
- ☆23Apr 7, 2025Updated 10 months ago