ZiangYan / pda.pytorch
Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.
☆11Updated 3 years ago
Alternatives and similar repositories for pda.pytorch:
Users that are interested in pda.pytorch are comparing it to the libraries listed below
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Updated 4 years ago
- kyleliang919 / Uncovering-the-Connections-BetweenAdversarial-Transferability-and-Knowledge-Transferabilitycode for ICML 2021 paper in which we explore the relationship between adversarial transferability and knowledge transferability.☆17Updated 2 years ago
- [NeurIPS 2021] Better Safe Than Sorry: Preventing Delusive Adversaries with Adversarial Training☆31Updated 3 years ago
- Pytorch implementation of NPAttack☆12Updated 4 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago
- ☆19Updated 3 years ago
- ☆11Updated 5 years ago
- ☆29Updated 2 years ago
- ☆35Updated 4 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 4 years ago
- ☆40Updated last year
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆37Updated 2 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 4 years ago
- Code for paper "Poisoned classifiers are not only backdoored, they are fundamentally broken"☆26Updated 3 years ago
- Attacks using out-of-distribution adversarial examples☆12Updated 5 years ago
- [NeurIPS2021] Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks☆34Updated 7 months ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- [ICLR'21] Dataset Inference for Ownership Resolution in Machine Learning☆32Updated 2 years ago
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆44Updated last year
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆17Updated last year
- Adversarial Distributional Training (NeurIPS 2020)☆62Updated 3 years ago
- RAB: Provable Robustness Against Backdoor Attacks☆39Updated last year
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆45Updated last year
- ☆10Updated 3 years ago
- MACER: MAximizing CErtified Radius (ICLR 2020)☆28Updated 5 years ago
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago