ZhengyuZhao / AdvColorFilter
Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)
☆31Updated last year
Related projects ⓘ
Alternatives and complementary repositories for AdvColorFilter
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations☆13Updated 2 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆52Updated 4 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆59Updated 5 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆56Updated last year
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆41Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 4 years ago
- Strongest attack against Feature Scatter and Adversarial Interpolation☆24Updated 4 years ago
- ☆35Updated 3 years ago
- A fast sparse attack on deep neural networks.☆50Updated 4 years ago
- Code for our NeurIPS 2020 paper Practical No-box Adversarial Attacks against DNNs.☆33Updated 3 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆36Updated 2 years ago
- Python implementation for paper: Feature Distillation: DNN-Oriented JPEG Compression Against Adversarial Examples☆11Updated 6 years ago
- ☆44Updated 4 years ago
- ☆10Updated 5 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆97Updated 3 years ago
- [ICML 2021 Long Talk] "Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm" by Mingkang Zhu, Tianlong Chen, Zhangyang Wa…☆9Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 4 years ago
- Project page for our paper: Interpreting Adversarially Trained Convolutional Neural Networks☆64Updated 5 years ago
- ☆46Updated 3 years ago
- ☆25Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 2 years ago
- ☆26Updated 2 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆59Updated 5 years ago
- LAFEAT: Piercing Through Adversarial Defenses with Latent Features (CVPR 2021 Oral)☆17Updated 3 years ago
- ☆39Updated 2 years ago
- Implementation of our NeurIPS 2019 paper: Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks☆10Updated 4 years ago
- A pytorch re-implementation for paper "Towards Deep Learning Models Resistant to Adversarial Attacks"☆17Updated 5 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆60Updated 5 years ago