abhishekaich27 / GAMA-pytorch
[NeurIPS'22] GAMA: Generative Adversarial Multi-Object Scene Attacks
☆17Updated last year
Alternatives and similar repositories for GAMA-pytorch:
Users that are interested in GAMA-pytorch are comparing it to the libraries listed below
- ☆34Updated 9 months ago
- [ICCV 2023] Structure Invariant Transformation for better Adversarial Transferability☆23Updated last year
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Updated 3 years ago
- Official codes for GRA (Accepted by ICCV2023)☆16Updated last year
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆27Updated 3 months ago
- [CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method☆22Updated 2 years ago
- Code for Prior-Guided Adversarial Initialization for Fast Adversarial Training (ECCV2022)☆26Updated 2 years ago
- Official repository for CVPR 2022 paper 'Boosting Black-Box Attack with Partially Transferred Conditional Adversarial Distribution'☆26Updated 3 years ago
- ☆18Updated last year
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Updated 2 years ago
- Minimizing Maximum Model Discrepancy for Transferable Black-box Targeted Attacks(CVPR2023)☆17Updated last year
- ☆14Updated 2 years ago
- A curated list of papers for the transferability of adversarial examples☆63Updated 8 months ago
- This is the official code for "Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better"☆39Updated 3 years ago
- [CVPR 2023] Official implementation of the Clean Feature Mixup (CFM) method☆16Updated last year
- LiangSiyuan21 / Parallel-Rectangle-Flip-Attack-A-Query-based-Black-box-Attack-against-Object-DetectionA Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆28Updated 3 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆60Updated 2 years ago
- A Unified Approach to Interpreting and Boosting Adversarial Transferability (ICLR2021)☆29Updated 2 years ago
- ☆23Updated last year
- Source of the ECCV22 paper "LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity"☆19Updated 3 weeks ago
- ☆34Updated 2 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆60Updated 2 years ago
- ☆25Updated 3 years ago
- ☆13Updated 2 years ago
- Towards Defending against Adversarial Examples via Attack-Invariant Features☆10Updated last year
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆28Updated 4 years ago
- [BMVC 2023] Semantic Adversarial Attacks via Diffusion Models☆21Updated last year
- The official implementation for "Towards Transferable Targeted 3D Adversarial Attack in the Physical World" (CVPR, 2024))☆29Updated 7 months ago
- Implementation of AAAI 2022 Paper: Context-Aware Transfer Attacks for Object Detection☆18Updated 3 years ago
- [NeurIPS 2023] Codes for DiffAttack: Evasion Attacks Against Diffusion-Based Adversarial Purification☆29Updated last year