ahchang98 / image-encryption-scheme-attacksLinks
Attacks against proposed image encryption schemes
☆10Updated 5 years ago
Alternatives and similar repositories for image-encryption-scheme-attacks
Users that are interested in image-encryption-scheme-attacks are comparing it to the libraries listed below
Sorting:
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- ☆21Updated 3 years ago
- Unofficial pytorch implementation of Fourier Heat Map proposed in 'A Fourier Perspective on Model Robustness in Computer Vision' [Yin+, N…☆75Updated last year
- ☆30Updated 3 years ago
- Codes for ICCV 2021 paper "AGKD-BML: Defense Against Adversarial Attack by Attention Guided Knowledge Distillation and Bi-directional Met…☆12Updated 3 years ago
- [ECCV 2020] Pytorch codes for Open-set Adversarial Defense☆22Updated 3 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Updated 4 years ago
- PyTorch implementation of Spatially Transformed Adversarial Examples☆22Updated 2 years ago
- [NeurIPS 2021] "Class-Disentanglement and Applications in Adversarial Detection and Defense"☆46Updated 4 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆24Updated last year
- the source code of ACM MM'21 paper "Discriminator-free Generative Adversarial Attack"☆11Updated 2 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Updated 3 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 5 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38Updated 3 years ago
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- ☆26Updated 4 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- [NeurIPS2020] The official repository of "AdvFlow: Inconspicuous Black-box Adversarial Attacks using Normalizing Flows".☆49Updated 2 years ago
- The official implementation codes of greedy residuals for the paper Watermarking Deep Neural Networks with Greedy Residuals (ICML 2021).☆24Updated 3 years ago
- This repository provides code for "On Interaction Between Augmentations and Corruptions in Natural Corruption Robustness".☆46Updated 3 years ago
- PyTorch implementation of "Feature Denoising for Improving Adversarial Robustness" on CIFAR10.☆34Updated 5 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 5 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Updated 2 years ago
- [ICCV 2021] Amplitude-Phase Recombination: Rethinking Robustness of Convolutional Neural Networks in Frequency Domain☆80Updated 3 years ago
- ☆29Updated 5 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago
- The code for ECCV2022 (Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal)☆44Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated 2 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Updated last year