google-research / preprocessor-aware-black-box-attack
☆20Updated 2 years ago
Alternatives and similar repositories for preprocessor-aware-black-box-attack:
Users that are interested in preprocessor-aware-black-box-attack are comparing it to the libraries listed below
- ☆13Updated 2 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆16Updated 2 years ago
- Official repository for "On Improving Adversarial Transferability of Vision Transformers" (ICLR 2022--Spotlight)☆72Updated 2 years ago
- Code for the paper Boosting Accuracy and Robustness of Student Models via Adaptive Adversarial Distillation (CVPR 2023).☆34Updated last year
- SEAT☆20Updated last year
- [NeurIPS 2021] “When does Contrastive Learning Preserve Adversarial Robustness from Pretraining to Finetuning?”☆48Updated 3 years ago
- [NeurIPS2021] Code Release of Learning Transferable Perturbations☆28Updated 4 months ago
- ☆40Updated last year
- ☆10Updated 2 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆11Updated last year
- Adversarial Augmentation Against Adversarial Attacks☆30Updated last year
- Helper-based Adversarial Training: Reducing Excessive Margin to Achieve a Better Accuracy vs. Robustness Trade-off☆29Updated 2 years ago
- ☆23Updated 2 years ago
- Certified Patch Robustness via Smoothed Vision Transformers☆42Updated 3 years ago
- [ICML2023] Revisiting Data-Free Knowledge Distillation with Poisoned Teachers☆23Updated 9 months ago
- Data-Efficient Backdoor Attacks☆18Updated 2 years ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆17Updated last year
- Pytorch implementation of NPAttack☆12Updated 4 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Updated 4 years ago
- Code for Boosting fast adversarial training with learnable adversarial initialization (TIP2022)☆29Updated last year
- ☆30Updated 2 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Updated 3 years ago
- GreedyFool (NIPS2020) official code for saprse adversarial attack☆35Updated 4 years ago
- ☆53Updated last year
- ☆18Updated last year
- Code corresponding to the paper: "On the Robustness of Vision Transformers": https://arxiv.org/abs/2104.02610☆24Updated last year
- Codes for reproducing the results of the paper "Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness" published at IC…☆27Updated 4 years ago
- ☆20Updated 4 months ago
- ☆59Updated 2 years ago
- ☆15Updated 2 years ago