alldbi / SmoothFoolLinks
SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations
☆14Updated 4 years ago
Alternatives and similar repositories for SmoothFool
Users that are interested in SmoothFool are comparing it to the libraries listed below
Sorting:
- Unrestricted adversarial images via interpretable color transformations (TIFS 2023 & BMVC 2020)☆32Updated 2 years ago
- A fast sparse attack on deep neural networks.☆51Updated 5 years ago
- This repo contains the code for CVPR submission "Big but Invisible Adversarial Attack"☆30Updated 5 years ago
- Large yet imperceptible adversarial perturbations with perceptual color distance (CVPR 2020)☆62Updated 2 years ago
- Source code for Regional Homogeneity: Towards Learning Transferable Universal Adversarial Perturbations Against Defenses (ECCV 2020)☆42Updated 6 years ago
- Source code for Learning Transferable Adversarial Examples via Ghost Networks (AAAI2020)☆58Updated 6 years ago
- PyTorch implementation of ColorFool: Semantic Adversarial Colorization, CVPR2020☆53Updated 5 years ago
- Rob-GAN: Generator, Discriminator and Adversarial Attacker☆84Updated 6 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆89Updated 7 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 6 years ago
- Code of our recently published attack FDA: Feature Disruptive Attack. Colab Notebook: https://colab.research.google.com/drive/1WhkKCrzFq5…☆21Updated 6 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Adversarial Defense by Restricting the Hidden Space of Deep Neural Networks, in ICCV 2019☆58Updated 6 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆75Updated 7 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆37Updated 5 years ago
- The implementation of 'Curls & Whey: Boosting Black-Box Adversarial Attacks' in pytorch☆61Updated 6 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 5 years ago
- Code for "Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors"☆64Updated 6 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).