anirudh9784 / Adversarial-Attacks-and-Defences
A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆21Updated 2 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences:
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 5 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆57Updated 3 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 6 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 2 years ago
- ☆40Updated last year
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆44Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆25Updated 2 years ago
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 2 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆33Updated 3 years ago
- ☆83Updated 4 years ago
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆72Updated last year
- Image Super-Resolution as a Defense Against Adversarial Attacks☆91Updated 6 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆71Updated 4 years ago
- ☆39Updated last year
- Universal Adversarial Perturbations (UAPs) for PyTorch☆47Updated 3 years ago
- ☆54Updated last year
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆81Updated 2 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆26Updated 4 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- Pytorch code for ens_adv_train☆15Updated 5 years ago
- ☆11Updated 5 years ago
- ☆57Updated 2 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆36Updated 2 months ago