anirudh9784 / Adversarial-Attacks-and-Defences
A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Adversarial-Attacks-and-Defences
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆32Updated 3 years ago
- ☆41Updated last year
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆30Updated 3 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 5 years ago
- ☆79Updated 3 years ago
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 4 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Updated 10 months ago
- Repository for Certified Defenses for Adversarial Patch ICLR-2020☆32Updated 4 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆23Updated last year
- ☆17Updated last year
- ☆23Updated 2 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆42Updated last year
- Universal Adversarial Perturbations (UAPs) for PyTorch☆46Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆76Updated 2 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆23Updated 2 years ago
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆14Updated 3 years ago
- This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/ab…☆38Updated last year
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆56Updated 3 years ago
- Paper sharing in adversary related works☆44Updated 3 weeks ago
- A pytorch implementation of "Ensemble Adversarial Training : Attacks and Defenses"☆9Updated 5 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆89Updated 2 years ago
- Pytorch code for ens_adv_train☆16Updated 5 years ago
- ☆67Updated 3 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Updated 3 years ago
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆24Updated 3 years ago
- Implementation of ECCV 2020 "Sparse Adversarial Attack via Perturbation Factorization"☆27Updated 4 years ago
- ☆19Updated 4 years ago