google-research / preprocessor-aware-black-box-attack
☆20Updated 2 years ago
Alternatives and similar repositories for preprocessor-aware-black-box-attack:
Users that are interested in preprocessor-aware-black-box-attack are comparing it to the libraries listed below
- ☆13Updated 2 years ago
- SEAT☆20Updated last year
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆16Updated 2 years ago
- Code for a research paper "Part-Based Models Improve Adversarial Robustness" (ICLR 2023)☆23Updated last year
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Updated 4 years ago
- ☆23Updated last year
- Certified Patch Robustness via Smoothed Vision Transformers☆42Updated 3 years ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34Updated last year
- ☆30Updated 3 years ago
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- ☆39Updated last year
- ☆10Updated 3 years ago
- [ICML2023] Revisiting Data-Free Knowledge Distillation with Poisoned Teachers☆23Updated 8 months ago
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Updated 3 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆73Updated 2 years ago
- ☆12Updated 2 years ago
- official implementation of Towards Robust Model Watermark via Reducing Parametric Vulnerability☆13Updated 9 months ago
- Code for the paper titled "Adversarial Vulnerability of Randomized Ensembles" (ICML 2022).☆10Updated 2 years ago
- Official implementation of "Removing Batch Normalization Boosts Adversarial Training" (ICML'22)☆19Updated 2 years ago
- ☆29Updated 2 years ago
- [NeurIPS'22] Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork. Haotao Wang, Junyuan Hong,…☆14Updated last year
- Data-Efficient Backdoor Attacks☆18Updated 2 years ago
- Code for the paper "A Light Recipe to Train Robust Vision Transformers" [SaTML 2023]☆52Updated 2 years ago
- On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]☆35Updated 3 years ago
- ☆53Updated last year
- Pytorch implementation of NPAttack☆12Updated 4 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- Understanding the Limits of Unsupervised Domain Adaptation via Data Poisoning. (Neurips 2021)☆8Updated 3 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year
- Implementation for <Understanding Robust Overftting of Adversarial Training and Beyond> in ICML'22.☆12Updated 2 years ago