PyTorch implementation of Spatially Transformed Adversarial Examples
☆22Sep 18, 2023Updated 2 years ago
Alternatives and similar repositories for stadv-torch
Users that are interested in stadv-torch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DeepSAVA: Sparse Adversarial Video Attacks with Spatial Transformations - BMVC 2021 & Neural Networks (2023)☆12Dec 13, 2024Updated last year
- Automated question generation and question answering from Turkish texts using text-to-text transformers☆49Aug 12, 2022Updated 3 years ago
- Spatially Transformed Adversarial Examples with TensorFlow☆74Nov 3, 2018Updated 7 years ago
- AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks☆19May 12, 2025Updated 11 months ago
- The code for the paper titled as "DifAttack: Query-Efficient Black-Box Attack via Disentangled Feature Space".☆23Feb 10, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The code of our AAAI 2021 paper "Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-transform Domain"☆16Apr 1, 2021Updated 5 years ago
- CVPR 2019 Paper——Feature Space Perturbations Yield More Transferable Adversarial Examples re-implementation.☆12Dec 29, 2021Updated 4 years ago
- CENG502 Spring 2022 Projects☆20May 5, 2023Updated 3 years ago
- ☆35Sep 6, 2025Updated 8 months ago
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 6 months ago
- Official code for "TWINS: A Fine-Tuning Framework for Improved Transferability of Adversarial Robustness and Generalization", CVPR 2023☆13Apr 26, 2023Updated 3 years ago
- The code of the ICLR 2024 paper: Adversarial Training on Purification (AToP): Advancing Both Robustness and Generalization☆10Nov 21, 2024Updated last year
- Face swap via diffusion models [Lora+IP-Adapter+Controlnet+text embedding optimization]☆57Apr 2, 2024Updated 2 years ago
- Codes for ICLR 2020 paper "Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets"☆70Nov 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code for AAAI 2021 "Towards Feature Space Adversarial Attack".☆30Aug 24, 2021Updated 4 years ago
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- Stable-version repository of FADING, "Face Aging via Diffusion-based Editing" based on official repository.☆16Oct 5, 2025Updated 7 months ago
- unformal implementation of advdiffuser☆17Feb 4, 2024Updated 2 years ago
- Beyond Gradient Descent for Regularized Segmentation Losses☆11Sep 27, 2019Updated 6 years ago
- transfer attack; adversarial examples; black-box attack; unrestricted Adversarial Attacks on ImageNet; CVPR2021 天池黑盒竞赛☆24Oct 24, 2021Updated 4 years ago
- Code and pretrained models accompanying the paper "Ensembling geophysical models using Bayesian Neural Networks"☆10Jul 11, 2022Updated 3 years ago
- Codebase for "Exploring the Landscape of Spatial Robustness" (ICML'19, https://arxiv.org/abs/1712.02779).☆25Sep 16, 2019Updated 6 years ago
- Daily paper reading records☆15Mar 31, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Nov 19, 2022Updated 3 years ago
- Convert datasets from Hugging Face to FiftyOne for Visualization☆11Mar 15, 2024Updated 2 years ago
- ☆12May 6, 2022Updated 4 years ago
- An implementation of the AlphaZero algorithm for adversarial games to be used with the machine learning framework of your choice☆12Aug 30, 2020Updated 5 years ago
- Using Low-rank adaptation to quickly fine-tune diffusion models.☆11Mar 14, 2023Updated 3 years ago
- notes and solution about CSAPP☆30Dec 13, 2020Updated 5 years ago
- Variational Inference for a Normal Distribution☆13Mar 11, 2018Updated 8 years ago
- Code for Black-Box Adversarial Attack with Transferable Model-based Embedding☆57Jun 3, 2020Updated 5 years ago
- ☆11Nov 27, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Less annoying Linux fan control for GPD Win Max 2☆10Oct 24, 2023Updated 2 years ago
- ☆25Feb 14, 2024Updated 2 years ago
- ☆28Dec 31, 2020Updated 5 years ago
- Code for LAS-AT: Adversarial Training with Learnable Attack Strategy (CVPR2022)☆119Mar 30, 2022Updated 4 years ago
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆25Dec 16, 2025Updated 4 months ago
- Code for the ECCV 2020 paper: `Look here! A learning based approach to redirect visual attention'☆13Aug 19, 2020Updated 5 years ago
- PyTorch code of “Out-of-Sample Representation Learning for Multi-Relational Graphs” (EMNLP 2020)☆10Oct 2, 2020Updated 5 years ago