anirudh9784 / Adversarial-Attacks-and-Defences
A defense algorithm which utilizes the combination of an auto- encoder and block-switching architecture. Auto-coder is intended to remove any perturbations found in input images whereas block switching method is used to make it more robust against White-box attack. Attack is planned using FGSM model, and the subsequent counter-attack by the prop…
☆20Updated 2 years ago
Alternatives and similar repositories for Adversarial-Attacks-and-Defences:
Users that are interested in Adversarial-Attacks-and-Defences are comparing it to the libraries listed below
- Codes for reproducing query-efficient black-box attacks in “AutoZOOM: Autoencoder-based Zeroth Order Optimization Method for Attacking B…☆57Updated 4 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆40Updated 4 years ago
- A PyTorch Implementation of the UAP attack☆19Updated 6 years ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 2 years ago
- Official implementation of the CVPR 2022 paper "Backdoor Attacks on Self-Supervised Learning".☆71Updated last year
- ☆40Updated last year
- ☆53Updated last year
- A PyTorch implementation of `MagNet: a Two-Pronged Defense against Adversarial Examples`☆15Updated 3 years ago
- Image Super-Resolution as a Defense Against Adversarial Attacks☆91Updated 6 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆79Updated 2 years ago
- Universal Adversarial Networks☆33Updated 6 years ago
- This repository contains the implementation of three adversarial example attack methods FGSM, IFGSM, MI-FGSM and one Distillation as defe…☆125Updated 4 years ago
- Is RobustBench/AutoAttack a suitable Benchmark for Adversarial Robustness?☆11Updated 2 years ago
- Pytorch code for ens_adv_train☆16Updated 5 years ago
- Code for the paper: Adversarial Training Against Location-Optimized Adversarial Patches. ECCV-W 2020.☆44Updated last year
- The code is for our NeurIPS 2019 paper: https://arxiv.org/abs/1910.04749☆32Updated 4 years ago
- ☆39Updated 11 months ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆29Updated 3 years ago
- The official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"☆57Updated 3 years ago
- SurFree: a fast surrogate-free black-box attack☆40Updated 6 months ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆36Updated last month
- PyTorch implementations of Adversarial defenses and utils.☆34Updated last year
- Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks☆38Updated 3 years ago
- Adversarial detection and defense for deep learning systems using robust feature alignment☆15Updated 4 years ago
- ☆50Updated 3 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- This repository contains the official PyTorch implementation of GeoDA algorithm. GeoDA is a Black-box attack to generate adversarial exam…☆32Updated 3 years ago
- Feature Scattering Adversarial Training (NeurIPS19)☆72Updated 7 months ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆23Updated 3 years ago
- A repository for the query-efficient black-box attack, SignHunter☆23Updated 5 years ago