☆20Mar 19, 2023Updated 2 years ago
Alternatives and similar repositories for preprocessor-aware-black-box-attack
Users that are interested in preprocessor-aware-black-box-attack are comparing it to the libraries listed below
Sorting:
- Pytorch implementation for the pilot study on the robustness of latent diffusion models.☆13Jun 20, 2023Updated 2 years ago
- ☆15Jul 24, 2022Updated 3 years ago
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆14Sep 27, 2018Updated 7 years ago
- The official implementation of NeurIPS 2021 paper: Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks☆17Jul 4, 2023Updated 2 years ago
- Official Code for Efficient and Effective Augmentation Strategy for Adversarial Training (NeurIPS-2022)☆17Mar 29, 2023Updated 2 years ago
- ☆20Feb 13, 2020Updated 6 years ago
- Pytorch code for ens_adv_train☆17Jun 7, 2019Updated 6 years ago
- Adversarial Examples on KNN (and its neural network friends)☆20Mar 19, 2020Updated 5 years ago
- [NeurIPS 2022] GAMA: Generative Adversarial Multi-Object Scene Attacks☆19Sep 5, 2023Updated 2 years ago
- Tensorflow implementation of Meta Adversarial Training for Adversarial Patch Attacks on Tiny ImageNet.☆26Jan 28, 2021Updated 5 years ago
- ☆23Apr 10, 2023Updated 2 years ago
- Guided Adversarial Attack for Evaluating and Enhancing Adversarial Defenses, NeurIPS Spotlight 2020☆27Dec 23, 2020Updated 5 years ago
- ☆64Jan 6, 2022Updated 4 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆22Aug 18, 2019Updated 6 years ago
- A Self-Consistent Robust Error (ICML 2022)☆69Jun 25, 2023Updated 2 years ago
- [ICLR 2022] "Patch-Fool: Are Vision Transformers Always Robust Against Adversarial Perturbations?" by Yonggan Fu, Shunyao Zhang, Shang Wu…☆33Mar 16, 2022Updated 3 years ago
- Code and data to go with the Zhu et al. paper "An Objective for Nuanced LLM Jailbreaks"☆36Dec 18, 2024Updated last year
- ☆46Dec 13, 2023Updated 2 years ago
- Exploratory Data Analysis of Time Series Data and Forecasting using Naïve Approach, Moving Average Method, Simple Exponential Smoothenin…☆12Jul 2, 2018Updated 7 years ago
- Cannabis strain information☆10Feb 20, 2016Updated 10 years ago
- ☆10Apr 20, 2023Updated 2 years ago
- ☆13Nov 21, 2025Updated 3 months ago
- ☆14Dec 5, 2025Updated 2 months ago
- The MCG black-box attack framework published in TPAMI 2022☆37Jan 17, 2023Updated 3 years ago
- 2024届求职-C++后端-学习笔记-操作系统、计算机网络、C++语言+算法☆13Oct 31, 2023Updated 2 years ago
- Official Implementation for CVPR 2025 paper Instant Adversarial Purification with Adversarial Consistency Distillation.☆15Dec 19, 2025Updated 2 months ago
- A daemon exposing the OpenZWave API via Apache Thrift (and some useful tools)☆27Nov 16, 2018Updated 7 years ago
- Reddit Data Science Project Ideas☆11Dec 28, 2019Updated 6 years ago
- Single-Life Reinforcement Learning☆14Dec 17, 2022Updated 3 years ago
- Experimental framework taking inspiration from biological systems, combining compression-based architectures, group theory, and symmetry …☆14Nov 13, 2025Updated 3 months ago
- gl hf☆14Oct 18, 2021Updated 4 years ago
- ☆12Dec 9, 2022Updated 3 years ago
- R script for visualising patient ward movements as timelines☆13May 13, 2022Updated 3 years ago
- A collection of some awesome public projects about LLM-based Web Agents and Tools.☆12Apr 25, 2024Updated last year
- Pytorch directly integrated to the cloud all through Bench AI!☆10Dec 10, 2023Updated 2 years ago
- ReColorAdv and other attacks from the NeurIPS 2019 paper "Functional Adversarial Attacks"☆38May 31, 2022Updated 3 years ago
- SurFree: a fast surrogate-free black-box attack☆44Jun 27, 2024Updated last year
- ☆88Jul 25, 2024Updated last year
- A Logisim schematic for a CPU that implements the Brainfuck language.☆10Mar 9, 2018Updated 7 years ago