anirudh9784 / Adversarial-Attacks-and-DefencesLinks
A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆20Updated 3 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below
Sorting:
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆16Updated 4 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆73Updated last year
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 3 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆24Updated 3 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆58Updated 4 years ago
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆39Updated 4 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆33Updated 4 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 5 years ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆27Updated 3 years ago
- ☆40Updated last year
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆32Updated 4 years ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Updated 2 years ago
- Code for the ICCV 2021 paper "Augmented Lagrangian Adversarial Attacks"☆22Updated last year
- Detection of adversarial examples using influence functions and nearest neighbors☆36Updated 2 years ago
- ☆25Updated 6 years ago
- ☆41Updated last year
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆131Updated 4 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 6 years ago
- Paper sharing in adversary related works☆45Updated last month
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆82Updated 3 years ago
- Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)☆100Updated 4 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Updated 4 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆12Updated 4 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆26Updated 3 years ago
- ☆21Updated 4 years ago