[CVPR 2022] Official implementation of the Object-based Diverse Input (ODI) method
☆23Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ODI
Users that are interested in ODI are comparing it to the libraries listed below
Sorting:
- This is the official code repository for paper "Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantizati…☆14Sep 21, 2025Updated 5 months ago
- Simple yet effective targeted transferable attack (NeurIPS 2021)☆51Nov 17, 2022Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆29Dec 7, 2024Updated last year
- Code for our NeurIPS 2020 paper Backpropagating Linearly Improves Transferability of Adversarial Examples.☆42Feb 10, 2023Updated 3 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks (ICIP 2022 Oral)☆19Oct 11, 2022Updated 3 years ago
- Spectrum simulation attack (ECCV'2022 Oral) towards boosting the transferability of adversarial examples☆115Jul 21, 2022Updated 3 years ago
- Code for "Adversarial Attack Generation Empowered by Min-Max Optimization", NeurIPS 2021☆19Dec 6, 2021Updated 4 years ago
- Convert tensorflow model to pytorch model via [MMdnn](https://github.com/microsoft/MMdnn) for adversarial attacks.☆94Dec 1, 2022Updated 3 years ago
- code for "Feature Importance-aware Transferable Adversarial Attacks"☆86Jun 9, 2022Updated 3 years ago
- [ECCV 2022] Shape Matters: Deformable Patch Attack☆22Feb 22, 2023Updated 3 years ago
- ☆26Jun 4, 2025Updated 8 months ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- Sparse and Imperceivable Adversarial Attacks (accepted to ICCV 2019).☆43Nov 8, 2020Updated 5 years ago
- The official repo for the paper "An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability"☆44Oct 12, 2023Updated 2 years ago
- A PyTorch port of the Neural 3D Mesh Renderer☆12Jul 27, 2022Updated 3 years ago
- a pytorch version of AdvGAN for cifar10 dataset☆10Dec 21, 2019Updated 6 years ago
- ☆71May 18, 2021Updated 4 years ago
- The extension of "Patch-wise Attack for Fooling Deep Neural Network (ECCV2020)", and we aim to boost the success rates of targeted attack…☆28Mar 14, 2022Updated 3 years ago
- Official code for "Boosting the Adversarial Transferability of Surrogate Model with Dark Knowledge"☆12Dec 22, 2023Updated 2 years ago
- Adversarial Robustness, White-box, Adversarial Attack☆52Jul 6, 2022Updated 3 years ago
- This repository contains the ViewFool and ImageNet-V proposed by the paper “ViewFool: Evaluating the Robustness of Visual Recognition to …☆33Dec 18, 2023Updated 2 years ago
- Official repository for "On Generating Transferable Targeted Perturbations" (ICCV 2021)☆62Mar 25, 2023Updated 2 years ago
- REAP: A Large-Scale Realistic Adversarial Patch Benchmark☆32Oct 9, 2023Updated 2 years ago
- NIPS 2017 - Adversarial Learning☆35Dec 4, 2017Updated 8 years ago
- ☆13Sep 21, 2019Updated 6 years ago
- Boosting the Transferability of Adversarial Attacks with Reverse Adversarial Perturbation (NeurIPS 2022)☆33Dec 16, 2022Updated 3 years ago
- ☆67Jun 2, 2022Updated 3 years ago
- PyTorch implementation of Expectation over Transformation☆13Jul 18, 2025Updated 7 months ago
- Transferable Adversarial Attacks for Image and Video Object Detection☆14Jul 7, 2020Updated 5 years ago
- Codes for CVPR2020 paper "Towards Transferable Targeted Attack".☆15Apr 24, 2022Updated 3 years ago
- Patch-wise iterative attack (accepted by ECCV 2020) to improve the transferability of adversarial examples.☆94Mar 13, 2022Updated 3 years ago
- Official repository for "Cross-Domain Transferability of Adversarial Perturbations" (NeurIPS 2019)☆64Jul 7, 2021Updated 4 years ago
- Code for CVPR2020 paper QEBA: Query-Efficient Boundary-Based Blackbox Attack☆33Feb 21, 2021Updated 5 years ago
- A curated list of papers for the transferability of adversarial examples☆76Jul 8, 2024Updated last year
- Our simple but effective staircase sign method which boosts the transferability of both non-targeted and targeted attacks.☆18Jul 5, 2022Updated 3 years ago
- Self-recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks☆18Aug 23, 2024Updated last year
- ☆36Feb 23, 2024Updated 2 years ago
- This is the repositoary for our paper published at ICML24.☆11Jun 11, 2025Updated 8 months ago