attackbench / AttackBenchLinks
Attack benchmark repository
☆21Updated last month
Alternatives and similar repositories for AttackBench
Users that are interested in AttackBench are comparing it to the libraries listed below
Sorting:
- ☆16Updated 3 months ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆24Updated 3 years ago
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆172Updated 4 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆167Updated last month
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆101Updated last month
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆87Updated 4 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆212Updated 3 years ago
- Towards Efficient and Effective Adversarial Training, NeurIPS 2021☆17Updated 3 years ago
- ☆17Updated last month
- ☆53Updated 4 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆49Updated 4 years ago
- Detection of adversarial examples using influence functions and nearest neighbors☆37Updated 3 years ago
- ☆31Updated last year
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46Updated 2 years ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆47Updated 7 years ago
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆33Updated 5 years ago
- Code for the paper "Better Diffusion Models Further Improve Adversarial Training" (ICML 2023)☆146Updated 2 years ago
- ☆22Updated 4 years ago
- Code for ICLR2020 "Improving Adversarial Robustness Requires Revisiting Misclassified Examples"☆152Updated 5 years ago
- A unified benchmark problem for data poisoning attacks☆161Updated 2 years ago
- ATTA (Efficient Adversarial Training with Transferable Adversarial Examples)☆37Updated 5 years ago
- ☆25Updated 2 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Updated 4 years ago
- ☆23Updated 2 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆32Updated 3 years ago
- Fantastic Robustness Measures: The Secrets of Robust Generalization [NeurIPS 2023]☆44Updated 11 months ago
- A paper list for localized adversarial patch research☆159Updated 5 months ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 3 years ago
- CLEVER (Cross-Lipschitz Extreme Value for nEtwork Robustness) is a robustness metric for deep neural networks☆63Updated 4 years ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆103Updated 4 years ago