This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/abs/1708.03999)
☆44Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for ZOO_Attack_PyTorch
Users that are interested in ZOO_Attack_PyTorch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆63Jun 6, 2019Updated 6 years ago
- Simultaneously Optimizing Perturbations and Positions for Black-box Adversarial Patch Attacks (TPAMI 2022)☆35Feb 9, 2023Updated 3 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- Paper https://arxiv.org/pdf/2306.06071.pdf Analysing how adversarial attacks aaffect YOLO Object Detection and visualising GradCAM☆23Dec 21, 2023Updated 2 years ago
- ☆36Feb 23, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Official implementation of the paper "Increasing Confidence in Adversarial Robustness Evaluations"☆21Mar 30, 2026Updated last week
- Square Attack: a query-efficient black-box adversarial attack via random search [ECCV 2020]☆169Jul 2, 2020Updated 5 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆20Nov 26, 2023Updated 2 years ago
- [CVPR 2024] Boosting Adversarial Transferability by Block Shuffle and Rotation☆14Feb 28, 2024Updated 2 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Mar 28, 2026Updated 2 weeks ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- [CVPR 2022 oral] Subspace Adversarial Training☆28Apr 27, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Official Code for Epsilon-Mesh Attack (IEEE FG 2024)☆17Nov 14, 2024Updated last year
- Attack-Inspired GAN - unofficial pytorch implementation☆17Jun 10, 2023Updated 2 years ago
- Adversarial Stickers: A Stealthy Attack Method in the Physical World (TPAMI 2022)☆42Dec 19, 2022Updated 3 years ago
- A Implementation of ICCV-2021(Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection)☆29Aug 27, 2021Updated 4 years ago
- This repository presents FSD dataset for song deepfake detection.☆25Aug 18, 2025Updated 7 months ago
- Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"☆201Mar 27, 2023Updated 3 years ago
- Synthesis speech detection based on Breathing-Talking-Silence sounds☆21Sep 3, 2025Updated 7 months ago
- PyTorch implementation of 'Vanilla' Gradient, Grad-CAM, Guided backprop, Integrated Gradients and their SmoothGrad variants.☆20Feb 15, 2026Updated last month
- This is the official implementation of the ICML 2023 paper - Can Forward Gradient Match Backpropagation ?☆13May 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implementation of our ICLR 2021 paper: Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples.☆11Mar 9, 2021Updated 5 years ago
- Pytorch implementation of NPAttack☆12Jul 7, 2020Updated 5 years ago
- SaTML 2023, 1st place in CVPR’21 Security AI Challenger: Unrestricted Adversarial Attacks on ImageNet.☆27Dec 29, 2022Updated 3 years ago
- Baseline system for SVDD 2024 Challenge CtrSVDD track☆28Nov 16, 2024Updated last year
- Spherical random features for polynomial kernels☆10Dec 1, 2015Updated 10 years ago
- ☆48Apr 7, 2025Updated last year
- AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models (ICCV 2023)☆19Jul 22, 2023Updated 2 years ago
- PyTorch implementation of adversarial attacks [torchattacks]☆2,155Jun 29, 2024Updated last year
- SAGA: Spectral Adversarial Geometric Attack on 3D Meshes (ICCV 2023)☆25Sep 25, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Beyond imagenet attack (accepted by ICLR 2022) towards crafting adversarial examples for black-box domains.☆61Jun 15, 2022Updated 3 years ago
- Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"☆60Oct 20, 2023Updated 2 years ago
- ☆12Nov 12, 2024Updated last year
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆118Mar 30, 2022Updated 4 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- An adversarial attack on object detectors☆147Oct 12, 2021Updated 4 years ago
- [CCS'22] SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders☆18Jul 12, 2022Updated 3 years ago