Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)
☆62Feb 1, 2023Updated 3 years ago
Alternatives and similar repositories for PerC-Adversarial
Users that are interested in PerC-Adversarial are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Apr 25, 2023Updated 2 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Oct 12, 2020Updated 5 years ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆41Feb 10, 2023Updated 3 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 4 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Mar 20, 2020Updated 6 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Mar 28, 2024Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Feb 21, 2021Updated 5 years ago
- Codes for reproducing the white-box adversarial attacks in “EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples,” …☆21Sep 22, 2018Updated 7 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Local Discriminative Regions for Scene Recognition (ACMMM 2018)☆22Oct 3, 2023Updated 2 years ago
- The translation-invariant adversarial attack method to improve the transferability of adversarial examples.☆140Aug 23, 2023Updated 2 years ago
- Revisiting Transferable Adversarial Images (TPAMI 2025)☆141Sep 11, 2025Updated 6 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- [ICLR 2023, Spotlight] Indiscriminate Poisoning Attacks on Unsupervised Contrastive Learning☆31Dec 2, 2023Updated 2 years ago
- ☆71May 18, 2021Updated 4 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆29Feb 1, 2022Updated 4 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- A targeted adversarial attack method, which won the NIPS 2017 targeted adversarial attacks competition☆135May 29, 2018Updated 7 years ago
- Provably defending pretrained classifiers including the Azure, Google, AWS, and Clarifai APIs☆100Apr 2, 2021Updated 4 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆97Oct 18, 2022Updated 3 years ago
- Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"☆136Nov 25, 2020Updated 5 years ago
- Adversarial queries for blocking Content-based Image Retrieval (CBIR)☆14May 3, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Blackbox attacks for deep neural network models☆69Aug 2, 2018Updated 7 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 3 years ago
- ☆17Aug 17, 2021Updated 4 years ago
- Adversarial Distributional Training (NeurIPS 2020)☆63Mar 17, 2021Updated 5 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- Official repository for "Stylized Adversarial Training" (TPAMI 2022)☆11Dec 30, 2022Updated 3 years ago
- ☆32Sep 2, 2024Updated last year
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Jul 7, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Coupling rejection strategy against adversarial attacks (CVPR 2022)☆29Mar 2, 2022Updated 4 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- PyTorch code for No-Reference Image Quality Assessment on KonIQ-10k☆63Oct 27, 2023Updated 2 years ago
- The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL☆237Mar 27, 2018Updated 8 years ago
- Understanding and Improving Fast Adversarial Training [NeurIPS 2020]☆96Sep 23, 2021Updated 4 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- Robust evasion attacks against neural network to find adversarial examples☆858Jun 1, 2021Updated 4 years ago