This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/abs/1708.03999)
☆44Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for ZOO_Attack_PyTorch
Users that are interested in ZOO_Attack_PyTorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆63Jun 6, 2019Updated 6 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆23Dec 21, 2023Updated 2 years ago
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆21Apr 16, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆170Jul 2, 2020Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated last month
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 3 years ago
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- This repository presents FSD dataset for song deepfake detection.☆25Aug 18, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- enhanced adversarial attack algorithm based on Adversarial Transformation Network(ATN)☆12Jun 18, 2019Updated 6 years ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Synthesis speech detection based on Breathing-Talking-Silence sounds☆21Sep 3, 2025Updated 7 months ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- PyTorch implementation of 'Vanilla' Gradient, Grad-CAM, Guided backprop, Integrated Gradients and their SmoothGrad variants.☆20Feb 15, 2026Updated 2 months ago
- This is the official implementation of the ICML 2023 paper - Can Forward Gradient Match Backpropagation ?☆13May 31, 2023Updated 2 years ago
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- ☆35May 29, 2024Updated last year
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Official Code of "Imperceptible Adversarial Attack via Invertible Neural Networks"☆24Jul 24, 2024Updated last year
- Spherical random features for polynomial kernels☆10Dec 1, 2015Updated 10 years ago
- Baseline system for SVDD 2024 Challenge CtrSVDD track☆29Nov 16, 2024Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,157Jun 29, 2024Updated last year
- SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)☆25Sep 25, 2023Updated 2 years ago
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- ☆12Nov 12, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆119Mar 30, 2022Updated 4 years ago
- An adversarial attack on object detectors☆147Oct 12, 2021Updated 4 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago
- An unrestricted attack based on diffusion models that can achieve both good transferability and imperceptibility.☆263Nov 23, 2025Updated 5 months ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 4 years ago
- [ICCV 2019] Enhancing Adversarial Example Transferability with an Intermediate Level Attack (https://arxiv.org/abs/1907.10823)☆80Oct 24, 2019Updated 6 years ago
- The official code for [ECCV2020] "HALO: Hardware-aware Learning to Optimize"☆10Mar 22, 2023Updated 3 years ago