attackbench / AttackBench
Attack benchmark repository
☆13Updated last month
Alternatives and similar repositories for AttackBench:
Users that are interested in AttackBench are comparing it to the libraries listed below
- ☆11Updated last week
- SecML-Torch: A Library for Robustness Evaluation of Deep Learning Models☆49Updated 3 weeks ago
- Foolbox implementation for NeurIPS 2021 Paper: "Fast Minimum-norm Adversarial Attacks through Adaptive Norm Constraints".☆25Updated 3 years ago
- Code for "On Adaptive Attacks to Adversarial Example Defenses"☆86Updated 4 years ago
- Library containing PyTorch implementations of various adversarial attacks and resources☆151Updated 3 weeks ago
- This repository provides simple PyTorch implementations for adversarial training methods on CIFAR-10.☆163Updated 4 years ago
- Implemented CURE algorithm from robustness via curvature regularization and vice versa☆31Updated 2 years ago
- ☆51Updated 3 years ago
- Code for the CVPR 2023 paper "Proximal Splitting Adversarial Attacks for Semantic Segmentation"☆21Updated 11 months ago
- A curated list of papers for the transferability of adversarial examples☆63Updated 8 months ago
- Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks (RAID 2018)☆48Updated 6 years ago
- Universal Adversarial Perturbations (UAPs) for PyTorch☆48Updated 3 years ago
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 2 years ago
- ☆39Updated last year
- Prediction Poisoning: Towards Defenses Against DNN Model Stealing Attacks (ICLR '20)☆28Updated 4 years ago
- ☆22Updated last year
- A Python library for Secure and Explainable Machine Learning☆172Updated 2 months ago
- [NeurIPS 2023] Code for the paper "Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threa…☆38Updated 3 months ago
- Code for the paper "On the Adversarial Robustness of Visual Transformers"☆56Updated 3 years ago
- Implementation of the paper "MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation".☆31Updated 3 years ago
- Keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on popular da…☆18Updated 9 months ago
- Understanding Catastrophic Overfitting in Single-step Adversarial Training [AAAI 2021]☆28Updated 2 years ago
- APBench: A Unified Availability Poisoning Attack and Defenses Benchmark (TMLR 08/2024)☆30Updated 2 months ago
- Implementation of gradient-based adversarial attack(FGSM,MI-FGSM,PGD)☆85Updated 3 years ago
- A curated list of papers on adversarial machine learning (adversarial examples and defense methods).☆210Updated 2 years ago
- ☆49Updated 3 years ago
- Code and checkpoints of compressed networks for the paper titled "HYDRA: Pruning Adversarially Robust Neural Networks" (NeurIPS 2020) (ht…☆90Updated 2 years ago
- Adversarial attacks including DeepFool and C&W☆13Updated 5 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆39Updated last year
- Visualization of Adversarial Examples☆34Updated 6 years ago